Search Results for Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026ps$003d300$0026isd$003dtrue? 2024-11-19T07:28:35Z Cryptography for developers ent://SD_ILS/0/SD_ILS:147686 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;St. Denis, Tom.&#160;Johnson, Simon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:106301 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA268 B83 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:93536 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA 268 .B83 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied Quantum Cryptography ent://SD_ILS/0/SD_ILS:191072 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kollmitzer, Christian. editor.&#160;Pivk, Mario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04831-9">http://dx.doi.org/10.1007/978-3-642-04831-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography ent://SD_ILS/0/SD_ILS:189106 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bernstein, Daniel J. editor.&#160;Buchmann, Johannes. editor.&#160;Dahmen, Erik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-based Cryptography ent://SD_ILS/0/SD_ILS:198157 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Myasnikov, Alexei. author.&#160;Ushakov, Alexander. author.&#160;Shpilrain, Vladimir. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:109547 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Menezes, Alfred J.&#160;Van Oorschot, Paul C., ort. yaz.&#160;Vanstone, Scott A., ort. yaz.<br/>Preferred Shelf Number&#160;QA76.9.A25 M46 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Fault Analysis in Cryptography ent://SD_ILS/0/SD_ILS:196746 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Joye, Marc. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:287889 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Menezes, A. J. (Alfred J.), 1965-&#160;Van Oorschot, Paul C.&#160;Vanstone, Scott A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/ISBN/9781439821916">book distributed by CRC Press. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:290669 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ling, San, 1964-&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420079470">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:290332 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:110595 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;QA268 .M65 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:289408 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420011241">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:518569 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518569.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47974-2">https://doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:287829 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Classical and Modern Cryptography for Beginners ent://SD_ILS/0/SD_ILS:520471 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Banoth, Rajkumar. author.&#160;Regar, Rekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520471.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32959-3">https://doi.org/10.1007/978-3-031-32959-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:364648 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA241 K73 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:488413 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Baldi, Marco. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Batten, Lynn Margaret.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography with Maple ent://SD_ILS/0/SD_ILS:333533 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;G&oacute;mez Pardo, Jos&eacute; Luis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333533.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:291582 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:299126 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yan, Song Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, Automata and Learning Theory ent://SD_ILS/0/SD_ILS:365541 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Thomas, D. Gnanaraj, ed. lit.&#160;Jeyanthi, P. Abisha, ed. lit.<br/>Preferred Shelf Number&#160;QA76.9.A25 C79 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elementary Number Theory, Cryptography and Codes ent://SD_ILS/0/SD_ILS:185736 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Baldoni, Maria Welleda. author.&#160;Ciliberto, Ciro. author.&#160;Cattaneo, Giulia Maria Piacentini. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Finite Automata and Application to Cryptography ent://SD_ILS/0/SD_ILS:188068 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tao, Renji. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gr&ouml;bner Bases, Coding, and Cryptography ent://SD_ILS/0/SD_ILS:189513 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sala, Massimiliano. editor.&#160;Sakata, Shojiro. editor.&#160;Mora, Teo. editor.&#160;Traverso, Carlo. editor.&#160;Perret, Ludovic. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:167545 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Silverman, J.H. author.&#160;Pipher, Jill. author.&#160;Hoffstein, Jeffrey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Story From Counting to Cryptography ent://SD_ILS/0/SD_ILS:175665 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Higgins, Peter M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elliptic curves number theory and cryptography ent://SD_ILS/0/SD_ILS:288710 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Washington, Lawrence C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:170731 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Welschenbach, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:285855 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035247">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Analog Side Channels Using Cryptography Algorithms ent://SD_ILS/0/SD_ILS:520646 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zaji&#263;, Alenka. author.&#160;Prvulovic, Milos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520646.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-38579-7">https://doi.org/10.1007/978-3-031-38579-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:356620 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356620.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482228908">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:169437 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography specifications and implementations ent://SD_ILS/0/SD_ILS:287504 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849387692">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of elliptic and hyperelliptic curve cryptography ent://SD_ILS/0/SD_ILS:289476 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cohen, Henri.&#160;Frey, Gerhard, 1944-&#160;Avanzi, Roberto.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420034981">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java cryptography extensions practical guide for programmers ent://SD_ILS/0/SD_ILS:253797 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Weiss, Jason (Jason R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 2. Basic Applications. ent://SD_ILS/0/SD_ILS:236754 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511721656">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 1. Basic Tools. ent://SD_ILS/0/SD_ILS:237721 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546891">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges ent://SD_ILS/0/SD_ILS:520438 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Seethalakshmi, V. editor.&#160;Dhanaraj, Rajesh Kumar. editor.&#160;Suganyadevi, S. editor.&#160;Ouaissa, Mariya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520438.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-35535-6">https://doi.org/10.1007/978-3-031-35535-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521266 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Esser, Andre. editor.&#160;Santini, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521266.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46495-9">https://doi.org/10.1007/978-3-031-46495-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security. FC 2022 International Workshops CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521301 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Matsuo, Shin'ichiro. editor.&#160;Gudgeon, Lewis. editor.&#160;Klages-Mundt, Ariah. editor.&#160;Perez Hernandez, Daniel. editor.&#160;Werner, Sam. editor.<br/>Preferred Shelf Number&#160;XX(521301.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32415-4">https://doi.org/10.1007/978-3-031-32415-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520852 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520852.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31368-4">https://doi.org/10.1007/978-3-031-31368-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520853 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520853.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31371-4">https://doi.org/10.1007/978-3-031-31371-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29-30, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520916 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Deneuville, Jean-Christophe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520916.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29689-5">https://doi.org/10.1007/978-3-031-29689-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520950 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520950.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33488-7">https://doi.org/10.1007/978-3-031-33488-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521065 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Johansson, Thomas. editor.&#160;Smith-Tone, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521065.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40003-2">https://doi.org/10.1007/978-3-031-40003-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521084 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521084.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33491-7">https://doi.org/10.1007/978-3-031-33491-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&amp;P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521216 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zhou, Jianying. editor. (orcid)&#160;Batina, Lejla. editor.&#160;Li, Zengpeng. editor.&#160;Lin, Jingqiang. editor.&#160;Losiouk, Eleonora. editor.<br/>Preferred Shelf Number&#160;XX(521216.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:521347 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521347.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48615-9">https://doi.org/10.1007/978-3-031-48615-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521348 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521348.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48618-0">https://doi.org/10.1007/978-3-031-48618-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:521349 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521349.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48621-0">https://doi.org/10.1007/978-3-031-48621-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:521350 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521350.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48624-1">https://doi.org/10.1007/978-3-031-48624-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483128 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8&ndash;10, 2019 Revised Selected Papers ent://SD_ILS/0/SD_ILS:483295 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ding, Jintai. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483608 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Albrecht, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486426 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Santini, Paolo. editor. (orcid)0000-0003-0631-3668&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484585 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486319 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Goldberg, Ian. editor.&#160;Moore, Tyler. editor. (orcid)0000-0002-8771-8191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485010 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127&#160;Mendelson, Avi. editor.&#160;Nandi, Mridul. editor. (orcid)0000-0002-1029-6576&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486060 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399450 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dinur, Itai. editor.&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399578 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399906 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983&#160;Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026&#160;Yarom, Yuval. editor. (orcid)0000-0003-0401-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:400424 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dooley, John F. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400566 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:401558 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wakayama, Masato. editor.&#160;Tanaka, Keisuke. editor.&#160;Kunihiro, Noboru. editor.&#160;Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:401823 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402041 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Adams, Carlisle. editor.&#160;Camenisch, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400334 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:400923 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:401426 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:518462 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518462.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-23473-1">https://doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519095 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Malkin, Tal. editor.&#160;Kolesnikov, Vladimir. editor.&#160;Lewko, Allison. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519095.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28166-7">https://doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519134 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519134.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519027 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519027.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46497-7">https://doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518872 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518872.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518897 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Groth, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518897.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27239-9">https://doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518908 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Okamoto, Tatsuaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518908.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47854-7">https://doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518982 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518982.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46494-6">https://doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519217 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Brenner, Michael. editor.&#160;Christin, Nicolas. editor.&#160;Johnson, Benjamin. editor.&#160;Rohloff, Kurt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519217.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48051-9">https://doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519305 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Eisenbarth, Thomas. editor.&#160;&Ouml;zt&uuml;rk, Erdin&ccedil;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519305.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16363-5">https://doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519308 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Schwabe, Peter. editor.&#160;Solworth, Jon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519308.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24126-5">https://doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:488308 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Pape, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489063 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bacon, Dave. editor.&#160;Martin-Delgado, Miguel. editor.&#160;Roetteler, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54429-3">https://doi.org/10.1007/978-3-642-54429-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:286252 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Patil, Harsh Kupwade.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335154.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196791 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Danezis, George. editor.&#160;Dietrich, Sven. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194087 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Biryukov, Alex. editor.&#160;Gong, Guang. editor.&#160;Stinson, Douglas R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman ent://SD_ILS/0/SD_ILS:195100 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Goldreich, Oded. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193796 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dam, Wim. editor.&#160;Kendon, Vivien M. editor.&#160;Severini, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195967 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Chen, Liqun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nonlinear laser dynamics from quantum dots to cryptography ent://SD_ILS/0/SD_ILS:306141 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;L&uuml;dge, Kathy.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191801 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Micciancio, Daniele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Information, Computation and Cryptography An Introductory Survey of Theory, Technology and Experiments ent://SD_ILS/0/SD_ILS:191835 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Benatti, Fabio. editor.&#160;Fannes, Mark. editor.&#160;Floreanini, Roberto. editor.&#160;Petritis, Dimitri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11914-9">http://dx.doi.org/10.1007/978-3-642-11914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:190836 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192701 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sion, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14577-3">http://dx.doi.org/10.1007/978-3-642-14577-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192838 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sion, Radu. editor.&#160;Curtmola, Reza. editor.&#160;Dietrich, Sven. editor.&#160;Kiayias, Aggelos. editor.&#160;Miret, Josep M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:188668 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Schroeder, Manfred. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85298-8">http://dx.doi.org/10.1007/978-3-540-85298-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190581 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shacham, Hovav. editor.&#160;Waters, Brent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:190657 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dingledine, Roger. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191450 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Childs, Andrew. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10698-9">http://dx.doi.org/10.1007/978-3-642-10698-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2009 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189697 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jarecki, Stanis&#322;aw. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00468-1">http://dx.doi.org/10.1007/978-3-642-00468-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188130 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188716 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Galbraith, Steven D. editor.&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188792 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ostrovsky, Rafail. editor.&#160;Prisco, Roberto. editor.&#160;Visconti, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting ent://SD_ILS/0/SD_ILS:186333 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cole, Peter H. editor.&#160;Ranasinghe, Damith C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189241 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kawano, Yasuhito. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186107 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Vadhan, Salil P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186640 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Katz, Jonathan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186868 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Okamoto, Eiji. editor.&#160;Okamoto, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187851 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Adams, Carlisle. editor.&#160;Miri, Ali. editor.&#160;Wiener, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:187854 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dietrich, Sven. editor.&#160;Dhamija, Rachna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186340 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187165 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Biham, Eli. editor.&#160;Youssef, Amr M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184267 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ytrehus, &Oslash;yvind. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183624 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Preneel, Bart. editor.&#160;Tavares, Stafford. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184906 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Breveglieri, Luca. editor.&#160;Koren, Israel. editor.&#160;Naccache, David. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:184908 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Crescenzo, Giovanni. editor.&#160;Rubin, Avi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:180834 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Schroeder, Manfred R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183489 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Halevi, Shai. editor.&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184658 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Prisco, Roberto. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183856 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yung, Moti. editor.&#160;Dodis, Yevgeniy. editor.&#160;Kiayias, Aggelos. editor.&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183360 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Smart, Nigel P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182721 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ioannidis, John. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182361 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Handschuh, Helena. editor.&#160;Hasan, M. Anwar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182373 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kilian, Joe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182377 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:182827 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Patrick, Andrew S. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar ent://SD_ILS/0/SD_ILS:236641 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Golomb, Solomon W..&#160;Gong, Guang.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546907">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice /cWilliam Stallings. ent://SD_ILS/0/SD_ILS:93149 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK 5105.59 S25 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Foundations of coding theory and applications of error-correcting codes, with an introduction to cryptography and information theory ent://SD_ILS/0/SD_ILS:300313 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ad&aacute;mek, Ji&#345;&iacute;, ing.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033265">An electronic book accessible through the World Wide Web; click for information</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/22660845.html">http://catalog.hathitrust.org/api/volumes/oclc/22660845.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modelling and Verification of Secure Exams ent://SD_ILS/0/SD_ILS:401571 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Giustolisi, Rosario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Block Cipher Companion ent://SD_ILS/0/SD_ILS:193573 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Knudsen, Lars R. author.&#160;Robshaw, Matthew J.B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Efficient Secure Two-Party Protocols Techniques and Constructions ent://SD_ILS/0/SD_ILS:192608 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hazay, Carmit. author.&#160;Lindell, Yehuda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Statistical Steganalysis ent://SD_ILS/0/SD_ILS:192611 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;B&ouml;hme, Rainer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Locally Decodable Codes and Private Information Retrieval Schemes ent://SD_ILS/0/SD_ILS:192626 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yekhanin, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The LLL Algorithm Survey and Applications ent://SD_ILS/0/SD_ILS:190278 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Nguyen, Phong Q. editor.&#160;Vall&eacute;e, Brigitte. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Signcryption ent://SD_ILS/0/SD_ILS:189264 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Dent, Alexander W. editor.&#160;Zheng, Yuliang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Secret Sharing A Systematic Overview and Guide for Protocol Selection ent://SD_ILS/0/SD_ILS:520451 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Krenn, Stephan. author.&#160;Lor&uuml;nser, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520451.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28161-7">https://doi.org/10.1007/978-3-031-28161-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:291418 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hinek, M. Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithmic cryptanalysis ent://SD_ILS/0/SD_ILS:286903 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Joux, Antoine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420070033">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:183559 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rosen, Alon. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:290796 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Networking Architecture and Technologies First International Conference, ICENAT 2022, Shenzhen, China, November 15-17, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520200 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Quan, Wei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520200.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9697-9">https://doi.org/10.1007/978-981-19-9697-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings ent://SD_ILS/0/SD_ILS:520658 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Li, Fengjun. editor.&#160;Liang, Kaitai. editor.&#160;Lin, Zhiqiang. editor.&#160;Katsikas, Sokratis K. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520658.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25538-0">https://doi.org/10.1007/978-3-031-25538-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520517 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Samarati, Pierangela. editor.&#160;van Sinderen, Marten. editor.&#160;Vimercati, Sabrina De Capitani di. editor.&#160;Wijnhoven, Fons. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520517.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-36840-0">https://doi.org/10.1007/978-3-031-36840-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520210 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Wang, Guojun. editor.&#160;Choo, Kim-Kwang Raymond. editor.&#160;Wu, Jie. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520210.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-0272-9">https://doi.org/10.1007/978-981-99-0272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Data Mining and Applications 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521313 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yang, Xiaochun. editor.&#160;Suhartanto, Heru. editor.&#160;Wang, Guoren. editor.&#160;Wang, Bin. editor.&#160;Jiang, Jing. editor.<br/>Preferred Shelf Number&#160;XX(521313.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46664-9">https://doi.org/10.1007/978-3-031-46664-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520516 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;You, Ilsun. editor.&#160;Kim, Hwankuk. editor.&#160;Angin, Pelin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520516.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4430-9">https://doi.org/10.1007/978-981-99-4430-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 9th International Workshop, WAIFI 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520791 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mesnager, Sihem. editor.&#160;Zhou, Zhengchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520791.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-22944-2">https://doi.org/10.1007/978-3-031-22944-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15-16, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520839 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Koucheryavy, Yevgeni. editor. (orcid)&#160;Aziz, Ahmed. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520839.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-30258-9">https://doi.org/10.1007/978-3-031-30258-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. ent://SD_ILS/0/SD_ILS:520859 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Doinea, Mihai. editor.&#160;Janicke, Helge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520859.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32636-3">https://doi.org/10.1007/978-3-031-32636-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520866 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;El Hajji, Said. editor.&#160;Mesnager, Sihem. editor.&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520866.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520887 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Buhan, Ileana. editor.&#160;Schneider, Tobias. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520887.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25319-5">https://doi.org/10.1007/978-3-031-25319-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520909 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kavun, Elif Bilge. editor.&#160;Pehl, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520909.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29497-6">https://doi.org/10.1007/978-3-031-29497-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2022 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520920 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Seo, Seung-Hyun. editor.&#160;Seo, Hwajeong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520920.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520922 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jourdan, Guy-Vincent. editor.&#160;Mounier, Laurent. editor.&#160;Adams, Carlisle. editor.&#160;S&egrave;des, Florence. editor.&#160;Garcia-Alfaro, Joaquin. editor.<br/>Preferred Shelf Number&#160;XX(520922.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-30122-3">https://doi.org/10.1007/978-3-031-30122-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520995 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Simpson, Leonie. editor.&#160;Rezazadeh Baee, Mir Ali. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520995.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multi-disciplinary Trends in Artificial Intelligence 16th International Conference, MIWAI 2023, Hyderabad, India, July 21-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521001 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Morusupalli, Raghava. editor.&#160;Dandibhotla, Teja Santosh. editor.&#160;Atluri, Vani Vathsala. editor.&#160;Windridge, David. editor.&#160;Lingras, Pawan. editor.<br/>Preferred Shelf Number&#160;XX(521001.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-36402-0">https://doi.org/10.1007/978-3-031-36402-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Science and Its Applications - ICCSA 2023 Workshops Athens, Greece, July 3-6, 2023, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:521012 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Gervasi, Osvaldo. editor. (orcid)&#160;Murgante, Beniamino. editor. (orcid)&#160;Rocha, Ana Maria A. C. editor. (orcid)&#160;Garau, Chiara. editor. (orcid)&#160;Scorza, Francesco. editor.<br/>Preferred Shelf Number&#160;XX(521012.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-37120-2">https://doi.org/10.1007/978-3-031-37120-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521067 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Li, Shujun. editor.&#160;Manulis, Mark. editor.&#160;Miyaji, Atsuko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521067.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-39828-5">https://doi.org/10.1007/978-3-031-39828-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2023 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521092 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;El Mrabet, Nadia. editor.&#160;De Feo, Luca. editor.&#160;Duquesne, Sylvain. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521092.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-37679-5">https://doi.org/10.1007/978-3-031-37679-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521115 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shikata, Junji. editor.&#160;Kuzuno, Hiroki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521115.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - LATINCRYPT 2023 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521179 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Aly, Abdelrahaman. editor.&#160;Tibouchi, Mehdi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521179.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44469-2">https://doi.org/10.1007/978-3-031-44469-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521250 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Wang, Ding. editor.&#160;Yung, Moti. editor. (orcid)&#160;Liu, Zheli. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521250.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing Science, Communication and Security 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520447 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Chaubey, Nirbhay. editor.&#160;Thampi, Sabu M. editor.&#160;Jhanjhi, Noor Zaman. editor.&#160;Parikh, Satyen. editor.&#160;Amin, Kiran. editor.<br/>Preferred Shelf Number&#160;XX(520447.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40564-8">https://doi.org/10.1007/978-3-031-40564-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Communication and Intelligent Systems First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520756 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shaw, Rabindra Nath. editor.&#160;Paprzycki, Marcin. editor.&#160;Ghosh, Ankush. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520756.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25088-0">https://doi.org/10.1007/978-3-031-25088-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science of Cyber Security 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521332 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Yung, Moti. editor. (orcid)&#160;Chen, Chao. editor.&#160;Meng, Weizhi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521332.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-45933-7">https://doi.org/10.1007/978-3-031-45933-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521356 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Athanasopoulos, Elias. editor.&#160;Mennink, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521356.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:521373 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521373.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-8742-9">https://doi.org/10.1007/978-981-99-8742-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kriptografi ile say&#305;lar teorisine giri&#351; ent://SD_ILS/0/SD_ILS:514074 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Kraft, James R.&#160;Terziler, Mehmet.<br/>Preferred Shelf Number&#160;QA241 K7319 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptographic security solutions for the internet of things ent://SD_ILS/0/SD_ILS:481771 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Banday, Mohammad Tariq, 1969- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:458788 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shavers, Brett, author.&#160;Bair, John, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:356403 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;ONLINE(356403.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518347 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Abawajy, Jemal H. editor.&#160;Mukherjea, Sougata. editor.&#160;Thampi, Sabu M. editor.&#160;Ruiz-Mart&iacute;nez, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518347.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22915-7">https://doi.org/10.1007/978-3-319-22915-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518386 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Bishop, Matt. editor.&#160;Miloslavskaya, Natalia. editor.&#160;Theocharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518386.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:518417 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518417.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoSchool ent://SD_ILS/0/SD_ILS:518657 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;von zur Gathen, Joachim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518657.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48425-8">https://doi.org/10.1007/978-3-662-48425-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518736 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Obaidat, Mohammad S. editor.&#160;Holzinger, Andreas. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518736.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25915-4">https://doi.org/10.1007/978-3-319-25915-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518770 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Foo, Ernest. editor.&#160;Stebila, Douglas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518770.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518790 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lauter, Kristin. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518790.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:518799 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Joye, Marc. editor.&#160;Moradi, Amir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518799.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16763-3">https://doi.org/10.1007/978-3-319-16763-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:518811 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Shi, Yun-Qing. editor.&#160;Kim, Hyoung Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;Yang, Ching-Nung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518811.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19321-2">https://doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SOFSEM 2015: Theory and Practice of Computer Science 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sn&#283;&#382;kou, Czech Republic, January 24-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518910 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Italiano, Giuseppe. editor.&#160;Margaria-Steffen, Tiziana. editor.&#160;Pokorn&yacute;, Jaroslav. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;Wattenhofer, Roger. editor.<br/>Preferred Shelf Number&#160;XX(518910.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46078-8">https://doi.org/10.1007/978-3-662-46078-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:519107 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Rhee, Kyung-Hyune. editor.&#160;Yi, Jeong Hyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519107.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518856 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Hui, Lucas C. K. editor.&#160;Qing, S. H. editor.&#160;Shi, Elaine. editor.&#160;Yiu, S. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518856.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:518984 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;Mesnager, Sihem. editor.&#160;Sava&#351;, Erkay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518984.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16277-5">https://doi.org/10.1007/978-3-319-16277-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518993 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Gennaro, Rosario. editor.&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518993.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47989-6">https://doi.org/10.1007/978-3-662-47989-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Reconfigurable Computing 11th International Symposium, ARC 2015, Bochum, Germany, April 13-17, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519004 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Sano, Kentaro. editor.&#160;Soudris, Dimitrios. editor.&#160;H&uuml;bner, Michael. editor.&#160;Diniz, Pedro C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519004.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16214-0">https://doi.org/10.1007/978-3-319-16214-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519197 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Qiu, Meikang. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;Zhang, Haibo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519197.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25645-0">https://doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519227 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Focardi, Riccardo. editor.&#160;Myers, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519227.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46666-7">https://doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519253 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Lopez, Javier. editor.&#160;Wu, Yongdong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519253.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing and Combinatorics 21st International Conference, COCOON 2015, Beijing, China, August 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519301 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Xu, Dachuan. editor.&#160;Du, Donglei. editor.&#160;Du, Dingzhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519301.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21398-9">https://doi.org/10.1007/978-3-319-21398-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519302 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Biryukov, Alex. editor.&#160;Goyal, Vipul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519302.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-26617-6">https://doi.org/10.1007/978-3-319-26617-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519314 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Gennaro, Rosario. editor.&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519314.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48000-7">https://doi.org/10.1007/978-3-662-48000-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CISSP CBK ent://SD_ILS/0/SD_ILS:291743 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Tipton, Harold F., editor of compilation.&#160;Hernandez, Steven, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466569782">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of finite fields ent://SD_ILS/0/SD_ILS:291673 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Mullen, Gary L.&#160;Panario, Daniel, 1959-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439873823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security literacy staying safe in a digital world ent://SD_ILS/0/SD_ILS:290839 2024-11-19T07:28:35Z 2024-11-19T07:28:35Z Author&#160;Jacobson, Douglas.&#160;Idziorek, Joseph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>