Search Results for Data encryption (Computer science) - Narrowed by: 2005 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-06-03T08:15:04Z Codes the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:284865 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182328 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Castelluccia, Claude. editor.&#160;Hartenstein, Hannes. editor.&#160;Paar, Christof. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:182332 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Maher, Michael J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103476">http://dx.doi.org/10.1007/b103476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings ent://SD_ILS/0/SD_ILS:182356 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Canteaut, Anne. editor.&#160;Viswanathan, Kapaleeswaran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182361 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Handschuh, Helena. editor.&#160;Hasan, M. Anwar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:182666 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Barni, Mauro. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor.&#160;Katzenbeisser, Stefan. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182721 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Ioannidis, John. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:182782 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Molva, Refik. editor.&#160;Tsudik, Gene. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182798 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Julisch, Klaus. editor.&#160;Kruegel, Christopher. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182816 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Gilbert, Henri. editor.&#160;Handschuh, Helena. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:182827 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Patrick, Andrew S. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182830 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182892 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Cox, Ingemar J. editor.&#160;Kalker, Ton. editor.&#160;Lee, Heung-Kyu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:151956 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Curtin, Matt.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:164977 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms: Design and Applications ent://SD_ILS/0/SD_ILS:164994 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Smith, Sean W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:164839 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Zou, Xukai. author.&#160;Ramamurthy, Byrav. author.&#160;Magliveras, Spyros S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication ent://SD_ILS/0/SD_ILS:164920 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:164923 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Robinson, Philip. editor.&#160;Vogt, Harald. editor.&#160;Wagealla, Waleed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:165224 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Weippl, Edgar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:165226 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Furht, Borko. author.&#160;Muharemagic, Edin. author.&#160;Socek, Daniel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypots for Windows ent://SD_ILS/0/SD_ILS:170712 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Grimes, Roger A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0007-9">http://dx.doi.org/10.1007/978-1-4302-0007-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:176342 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Filiol, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elektronik imza ve uygulamas&#305; ent://SD_ILS/0/SD_ILS:131968 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Orta, Mesut.<br/>Preferred Shelf Number&#160;KKX872.5 .O78 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Certification and Security in Inter-Organizational E-Service ent://SD_ILS/0/SD_ILS:165086 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Nardelli, Enrico. editor.&#160;Talamo, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15&ndash;18, 2004, Windermere, The Lake District, United Kingdom ent://SD_ILS/0/SD_ILS:165055 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Chadwick, David. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:165165 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Sasaki, Ryoichi. editor.&#160;Qing, Sihan. editor.&#160;Okamoto, Eiji. editor.&#160;Yoshiura, Hiroshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E&rsquo;2005), October 28&ndash;30, 2005, Poznan, Poland ent://SD_ILS/0/SD_ILS:165672 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Funabashi, Matohisa. editor.&#160;Grzech, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:168883 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Kowalik, Janusz S. editor.&#160;Gorski, Janusz. editor.&#160;Sachenko, Anatoly. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complexity Theory and Cryptology An Introduction to Cryptocomplexity ent://SD_ILS/0/SD_ILS:181782 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Rothe, J&ouml;rg. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182262 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Fridrich, Jessica. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2005 The Cryptographers&rsquo; Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182371 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Menezes, Alfred. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182373 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Kilian, Joe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182377 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182394 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Blundo, Carlo. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182757 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Chadwick, David. editor.&#160;Zhao, Gansen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182889 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Katsikas, Sokratis. editor.&#160;L&oacute;pez, Javier. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183003 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Zhou, Jianying. editor.&#160;Lopez, Javier. editor.&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures ent://SD_ILS/0/SD_ILS:183009 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183010 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Jajodia, Sushil. editor.&#160;Wijesekera, Duminda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2005 7th International Workshop, Edinburgh, UK, August 29 &ndash; September 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183013 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Rao, Josyula R. editor.&#160;Sunar, Berk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:183032 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Martin, David. editor.&#160;Serjantov, Andrei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:183113 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Helleseth, Tor. editor.&#160;Sarwate, Dilip. editor.&#160;Song, Hong-Yeop. editor.&#160;Yang, Kyeongcheol. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183117 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Barni, Mauro. editor.&#160;Cox, Ingemar. editor.&#160;Kalker, Ton. editor.&#160;Kim, Hyoung-Joong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183120 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183130 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Dawson, Ed. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183366 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Feng, Dengguo. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Modern Number Theory Fundamental Problems, Ideas and Theories ent://SD_ILS/0/SD_ILS:181540 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Manin, Yuri Ivanovic. author.&#160;Panchishkin, Alexei A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182902 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Lim, Chae Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182922 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Encryption Standard &ndash; AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:182926 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Dobbertin, Hans. editor.&#160;Rijmen, Vincent. editor.&#160;Sowa, Aleksandra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137765">http://dx.doi.org/10.1007/b137765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182956 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Shoup, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183045 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183049 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Dittmann, Jana. editor.&#160;Katzenbeisser, Stefan. editor.&#160;Uhl, Andreas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183050 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;Pang, HweeHwa. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183052 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Vimercati, Sabrina de Capitani. editor.&#160;Syverson, Paul. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183066 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183146 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Park, Choon-sik. editor.&#160;Chee, Seongtaek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183162 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Qing, Sihan. editor.&#160;Mao, Wenbo. editor.&#160;L&oacute;pez, Javier. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183254 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Roy, Bimal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183263 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Jia, Xiaohua. editor.&#160;Wu, Jie. editor.&#160;He, Yanxiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183265 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Maitra, Subhamoy. editor.&#160;Veni Madhavan, C. E. editor.&#160;Venkatesan, Ramarathnam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded and Ubiquitous Computing &ndash; EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183281 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Enokido, Tomoya. editor.&#160;Yan, Lu. editor.&#160;Xiao, Bin. editor.&#160;Kim, Daeyoung. editor.&#160;Dai, Yuanshun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183283 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Desmedt, Yvo G. editor.&#160;Wang, Huaxiong. editor.&#160;Mu, Yi. editor.&#160;Li, Yongqing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183360 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Smart, Nigel P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183364 2024-06-03T08:15:04Z 2024-06-03T08:15:04Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>