Search Results for Data. - Narrowed by: Coding theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-26T00:57:30Z Introduction to data compression ent://SD_ILS/0/SD_ILS:312418 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sayood, Khalid.<br/>Preferred Shelf Number&#160;TK5102.92 S39 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to data compression ent://SD_ILS/0/SD_ILS:254069 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sayood, Khalid.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780126208627">http://www.sciencedirect.com/science/book/9780126208627</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Data Compression ent://SD_ILS/0/SD_ILS:176098 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Salomon, David. author.&#160;Motta, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84882-903-9">http://dx.doi.org/10.1007/978-1-84882-903-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:175468 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Variable-length Codes for Data Compression ent://SD_ILS/0/SD_ILS:175645 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:164977 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:399621 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Vempaty, Aditya. author.&#160;Kailkhura, Bhavya. author.&#160;Varshney, Pramod K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Approaches in Spatial Data Handling ent://SD_ILS/0/SD_ILS:187281 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Hall, G. Brent. editor.&#160;Leahy, Michael G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74831-1">http://dx.doi.org/10.1007/978-3-540-74831-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:151956 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Curtin, Matt.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Body Area Networks: Smart IoT and Big Data for Intelligent Health Management 14th EAI International Conference, BODYNETS 2019, Florence, Italy, October 2-3, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485329 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mucchi, Lorenzo. editor. (orcid)0000-0001-6389-0221&#160;H&auml;m&auml;l&auml;inen, Matti. editor. (orcid)0000-0002-6115-5255&#160;Jayousi, Sara. editor. (orcid)0000-0002-7021-531X&#160;Morosi, Simone. editor. (orcid)0000-0002-0145-8406&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34833-5">https://doi.org/10.1007/978-3-030-34833-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487000 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;De Capitani di Vimercati, Sabrina. editor. (orcid)0000-0003-0793-3551&#160;Ren, Yizhi. editor. (orcid)0000-0002-1421-9164&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Storing and Transmitting Data Rudolf Ahlswede&rsquo;s Lectures on Information Theory 1 ent://SD_ILS/0/SD_ILS:487668 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ahlswede, Rudolf. author.&#160;Ahlswede, Alexander. editor.&#160;Alth&ouml;fer, Ingo. editor.&#160;Deppe, Christian. editor.&#160;Tamm, Ulrich. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05479-7">https://doi.org/10.1007/978-3-319-05479-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security ent://SD_ILS/0/SD_ILS:197164 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shi, Yun Q. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology in Disaster Risk Reduction Second IFIP TC 5 DCITDRR International Conference, ITDRR 2017, Sofia, Bulgaria, October 25-27, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483423 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Murayama, Yuko. editor.&#160;Velev, Dimiter. editor.&#160;Zlateva, Plamena. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18293-9">https://doi.org/10.1007/978-3-030-18293-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483389 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486418 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lange, Tanja. editor.&#160;Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486426 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Santini, Paolo. editor. (orcid)0000-0003-0631-3668&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:484493 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Li, Kuan-Ching. editor.&#160;Chen, Xiaofeng. editor.&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484528 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Knowledge Discovery, Knowledge Engineering and Knowledge Management 8th International Joint Conference, IC3K 2016, Porto, Portugal, November 9&ndash;11, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484574 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Fred, Ana. editor.&#160;Dietz, Jan. editor.&#160;Aveiro, David. editor. (orcid)0000-0001-6453-3648&#160;Liu, Kecheng. editor.&#160;Bernardino, Jorge. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99701-8">https://doi.org/10.1007/978-3-319-99701-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:485285 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology for Development for Africa Second International Conference, ICT4DA 2019, Bahir Dar, Ethiopia, May 28-30, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485457 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mekuria, Fisseha. editor.&#160;Nigussie, Ethiopia. editor. (orcid)0000-0002-2043-4274&#160;Tegegne, Tesfa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26630-1">https://doi.org/10.1007/978-3-030-26630-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486183 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1&ndash;3, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486138 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406&#160;Scanzio, Stefano. editor. (orcid)0000-0001-7643-2342&#160;Coleri Ergen, Sinem. editor. (orcid)0000-0002-7502-3122&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486312 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Yoo, Chang D. editor.&#160;Shi, Yun-Qing. editor.&#160;Kim, Hyoung Joong. editor.&#160;Piva, Alessandro. editor. (orcid)0000-0002-3047-0519&#160;Kim, Gwangsu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Transformation for a Sustainable Society in the 21st Century 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, Trondheim, Norway, September 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487057 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Pappas, Ilias O. editor. (orcid)0000-0001-7528-3488&#160;Mikalef, Patrick. editor. (orcid)0000-0002-6788-2277&#160;Dwivedi, Yogesh K. editor. (orcid)0000-0002-5547-9990&#160;Jaccheri, Letizia. editor. (orcid)0000-0002-5547-2270&#160;Krogstie, John. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29374-1">https://doi.org/10.1007/978-3-030-29374-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483164 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable ICT, Education and Learning IFIP WG 3.4 International Conference, SUZA 2019, Zanzibar, Tanzania, April 25&ndash;27, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483621 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Tatnall, Arthur. editor. (orcid)0000-0003-4317-971X&#160;Mavengere, Nicholas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28764-1">https://doi.org/10.1007/978-3-030-28764-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484878 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4&ndash;8, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484895 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Matsui, Mitsuru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484918 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Schwabe, Peter. editor.&#160;Th&eacute;riault, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484959 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Empowering Learners for Life in the Digital Age IFIP TC 3 Open Conference on Computers in Education, OCCE 2018, Linz, Austria, June 24&ndash;28, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486084 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Passey, Don. editor. (orcid)0000-0002-9205-502X&#160;Bottino, Rosa. editor. (orcid)0000-0001-6709-0053&#160;Lewin, Cathy. editor. (orcid)0000-0002-3430-4075&#160;Sanchez, Eric. editor. (orcid)0000-0002-3819-6681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23513-0">https://doi.org/10.1007/978-3-030-23513-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic Informatics 8th International Conference, CAI 2019, Ni&scaron;, Serbia, June 30&ndash;July 4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486210 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;&#262;iri&#263;, Miroslav. editor. (orcid)0000-0001-8625-4682&#160;Droste, Manfred. editor. (orcid)0000-0001-9128-8844&#160;Pin, Jean-&Eacute;ric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21363-3">https://doi.org/10.1007/978-3-030-21363-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Locally Relevant ICT Research 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South Africa, August 23-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486745 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Krauss, Kirstin. editor. (orcid)0000-0002-1328-7683&#160;Turpin, Marita. editor. (orcid)0000-0002-4425-2010&#160;Naude, Filistea. editor. (orcid)0000-0002-2629-1972&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11235-6">https://doi.org/10.1007/978-3-030-11235-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483569 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484089 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II ent://SD_ILS/0/SD_ILS:400626 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400637 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Fan, Junfeng. editor.&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399578 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400329 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shacham, Hovav. editor.&#160;Boldyreva, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Transformation and Global Society Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 &ndash; June 2, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:400174 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Alexandrov, Daniel A. editor. (orcid)0000-0002-4059-8903&#160;Boukhanovsky, Alexander V. editor.&#160;Chugunov, Andrei V. editor.&#160;Kabanov, Yury. editor. (orcid)0000-0002-4011-2010&#160;Koltsova, Olessia. editor. (orcid)0000-0002-2669-3154<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02843-5">https://doi.org/10.1007/978-3-030-02843-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:402116 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mayer, Joceli. author.&#160;Borges, Paulo V.K. author.&#160;J. Simske, Steven. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402655 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Nah, Fiona Fui-Hoon. editor.&#160;Xiao, Bo Sophia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Education Third International Symposium, SETE 2018, Held in Conjunction with ICWL 2018, Chiang Mai, Thailand, August 22&ndash;24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399411 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Hao, Tianyong. editor.&#160;Chen, Wei. editor.&#160;Xie, Haoran. editor.&#160;Nadee, Wanvimol. editor.&#160;Lau, Rynson. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03580-8">https://doi.org/10.1007/978-3-030-03580-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:399710 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:400765 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Liu, Leibo. author.&#160;Wang, Bo. author.&#160;Wei, Shaojun. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:400625 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I ent://SD_ILS/0/SD_ILS:400627 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:356620 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356620.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482228908">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487274 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Schmidt, Kai-Uwe. editor.&#160;Winterhof, Arne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Construction and Analysis of Cryptographic Functions ent://SD_ILS/0/SD_ILS:488664 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Budaghyan, Lilya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12991-4">https://doi.org/10.1007/978-3-319-12991-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Video Coding Systems ent://SD_ILS/0/SD_ILS:489385 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gao, Wen. author.&#160;Ma, Siwei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14243-2">https://doi.org/10.1007/978-3-319-14243-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:290669 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ling, San, 1964-&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420079470">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335066 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Palamidessi, Catuscia. editor.&#160;Ryan, Mark D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335066.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interference Cancellation Using Space-Time Processing and Precoding Design ent://SD_ILS/0/SD_ILS:333352 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Li, Feng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333352.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30712-6">http://dx.doi.org/10.1007/978-3-642-30712-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196823 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bruni, Roberto. editor.&#160;Sassone, Vladimiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30065-3">http://dx.doi.org/10.1007/978-3-642-30065-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2012 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196928 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Helleseth, Tor. editor.&#160;Jedwab, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30615-0">http://dx.doi.org/10.1007/978-3-642-30615-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197072 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mitrokotsa, Aikaterini. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197603 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Pieprzyk, Josef. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197310 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Prouff, Emmanuel. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195876 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Obaidat, Mohammad S. editor.&#160;Tsihrintzis, George A. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25206-8">http://dx.doi.org/10.1007/978-3-642-25206-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197201 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197478 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chim, Tat Wing. editor.&#160;Yuen, Tsz Hon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 &ndash; November 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197492 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;J&oslash;sang, Audun. editor.&#160;Carlsson, Bengt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network coding : fundamentals and applications ent://SD_ILS/0/SD_ILS:270311 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Medard, Muriel.&#160;Sprintson, Alex.<br/>Preferred Shelf Number&#160;TK5102.92 N48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> MIMO Communication for Cellular Networks ent://SD_ILS/0/SD_ILS:167487 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Huang, Howard. author.&#160;Papadias, Constantinos B. author.&#160;Venkatesan, Sivarama. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77523-4">http://dx.doi.org/10.1007/978-0-387-77523-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Noiseless steganography the key to covert communications ent://SD_ILS/0/SD_ILS:285243 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Desoky, Abdelrahman.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439846223">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic and stochastic coding theory ent://SD_ILS/0/SD_ILS:288122 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kythe, Dave K.&#160;Kythe, Prem K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466505629">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193883 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kim, Hyoung-Joong. editor.&#160;Shi, Yun Qing. editor.&#160;Barni, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18405-5">http://dx.doi.org/10.1007/978-3-642-18405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combinatorial Algorithms 21st International Workshop, IWOCA 2010, London, UK, July 26-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193973 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Iliopoulos, Costas S. editor.&#160;Smyth, William F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19222-7">http://dx.doi.org/10.1007/978-3-642-19222-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2011 13th International Workshop, Nara, Japan, September 28 &ndash; October 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195497 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Preneel, Bart. editor.&#160;Takagi, Tsuyoshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195966 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Lin, Dongdai. editor.&#160;Tsudik, Gene. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195967 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chen, Liqun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194254 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20077-9">http://dx.doi.org/10.1007/978-3-642-20077-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptology Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194525 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chee, Yeow Meng. editor.&#160;Guo, Zhenbo. editor.&#160;Ling, San. editor.&#160;Shao, Fengjing. editor.&#160;Tang, Yuansheng. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20901-7">http://dx.doi.org/10.1007/978-3-642-20901-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195249 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Robles, Rosslin John. editor.&#160;Balitanas, Maricel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game Start! Strumenti per comprendere i videogiochi ent://SD_ILS/0/SD_ILS:204562 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Alinovi, Francesco. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1956-0">http://dx.doi.org/10.1007/978-88-470-1956-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195888 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Qing, Sihan. editor.&#160;Susilo, Willy. editor.&#160;Wang, Guilin. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identity-Based Encryption ent://SD_ILS/0/SD_ILS:173195 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chatterjee, Sanjit. author.&#160;Sarkar, Palash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9383-0">http://dx.doi.org/10.1007/978-1-4419-9383-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193656 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Heng, Swee-Huay. editor.&#160;Wright, Rebecca N. editor.&#160;Goi, Bok-Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191801 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Micciancio, Daniele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192851 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mangard, Stefan. editor.&#160;Standaert, Fran&ccedil;ois-Xavier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15031-9">http://dx.doi.org/10.1007/978-3-642-15031-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2010 6th International Conference, Paris, France, September 13-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193113 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Carlet, Claude. editor.&#160;Pott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15874-2">http://dx.doi.org/10.1007/978-3-642-15874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection IV Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193415 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Moore, Tyler. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16806-2">http://dx.doi.org/10.1007/978-3-642-16806-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthly Global Computing 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193036 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Wirsing, Martin. editor.&#160;Hofmann, Martin. editor.&#160;Rauschmayer, Axel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15640-3">http://dx.doi.org/10.1007/978-3-642-15640-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193245 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Heng, Swee-Huay. editor.&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XI Special Issue on Security in Computing, Part II ent://SD_ILS/0/SD_ILS:193681 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17697-5">http://dx.doi.org/10.1007/978-3-642-17697-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193666 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Soriano, Miguel. editor.&#160;Qing, Sihan. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network coding fundamentals and applications ent://SD_ILS/0/SD_ILS:146258 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;M&eacute;dard, Muriel.&#160;Sprintson, Alex.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123809186">http://www.sciencedirect.com/science/book/9780123809186</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Signatures ent://SD_ILS/0/SD_ILS:165432 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Katz, Jonathan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:167094 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Huang, Scott C.-H. editor.&#160;MacCallum, David. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encryption for Digital Content ent://SD_ILS/0/SD_ILS:171850 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kiayias, Aggelos. author.&#160;Pehlivanoglu, Serdar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Processing and Information Retrieval 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189202 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Amir, Amihood. editor.&#160;Turpin, Andrew. editor.&#160;Moffat, Alistair. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89097-3">http://dx.doi.org/10.1007/978-3-540-89097-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration ent://SD_ILS/0/SD_ILS:190185 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Cortier, V&eacute;ronique. editor.&#160;Kirchner, Claude. editor.&#160;Okada, Mitsuhiro. editor.&#160;Sakurada, Hideki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190202 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ferrari, Elena. editor.&#160;Li, Ninghui. editor.&#160;Bertino, Elisa. editor.&#160;Karabulut, Yuecel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190149 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chee, Yeow Meng. editor.&#160;Li, Chao. editor.&#160;Ling, San. editor.&#160;Wang, Huaxiong. editor.&#160;Xing, Chaoping. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01877-0">http://dx.doi.org/10.1007/978-3-642-01877-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 18th International Symposium, AAECC-18 2009, Tarragona, Spain, June 8-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190242 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bras-Amor&oacute;s, Maria. editor.&#160;H&oslash;holdt, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02181-7">http://dx.doi.org/10.1007/978-3-642-02181-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques 12th International Workshop, APPROX 2009, and 13th International Workshop, RANDOM 2009, Berkeley, CA, USA, August 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190702 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Dinur, Irit. editor.&#160;Jansen, Klaus. editor.&#160;Naor, Joseph. editor.&#160;Rolim, Jos&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03685-9">http://dx.doi.org/10.1007/978-3-642-03685-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190703 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ho, Anthony T. S. editor.&#160;Shi, Yun Q. editor.&#160;Kim, H. J. editor.&#160;Barni, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03688-0">http://dx.doi.org/10.1007/978-3-642-03688-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191190 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05197-5">http://dx.doi.org/10.1007/978-3-642-05197-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection III Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191062 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Palmer, Charles. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04798-5">http://dx.doi.org/10.1007/978-3-642-04798-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combinatorial Algorithms 20th International Workshop, IWOCA 2009, Hradec nad Moravic&iacute;, Czech Republic, June 28&ndash;July 2, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191301 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Fiala, Ji&#345;&iacute;. editor.&#160;Kratochv&iacute;l, Jan. editor.&#160;Miller, Mirka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10217-2">http://dx.doi.org/10.1007/978-3-642-10217-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191311 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kim, Haeng-kon. editor.&#160;Kim, Tai-hoon. editor.&#160;Kiumi, Akingbehin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191592 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris J. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191012 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Pieprzyk, Josef. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings ent://SD_ILS/0/SD_ILS:191053 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;J&oslash;sang, Audun. editor.&#160;Maseng, Torleiv. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191365 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Garay, Juan A. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10433-6">http://dx.doi.org/10.1007/978-3-642-10433-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191427 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Roy, Bimal. editor.&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191494 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;&#346;l&#281;zak, Dominik. editor.&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-Chi. editor.&#160;Arnett, Kirk P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Key Establishment ent://SD_ILS/0/SD_ILS:167859 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Choo, Kim-Kwang Raymond. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:167881 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Papa, Mauricio. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190946 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers ent://SD_ILS/0/SD_ILS:190948 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kim, Hyoung-Joong. editor.&#160;Katzenbeisser, Stefan. editor.&#160;Ho, Anthony T. S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04438-0">http://dx.doi.org/10.1007/978-3-642-04438-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Video Compression Systems From first principles to concatenated codecs ent://SD_ILS/0/SD_ILS:247992 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bock, Alois M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE053E">http://dx.doi.org/10.1049/PBTE053E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual media coding and transmission ent://SD_ILS/0/SD_ILS:298290 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kondoz, A. M. (Ahmet M.)&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470740576">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470740644">http://dx.doi.org/10.1002/9780470740644</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=212323&ref=toc">http://www.myilibrary.com?id=212323&ref=toc</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10304103">http://site.ebrary.com/lib/alltitles/Doc?id=10304103</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470740576">http://proquest.tech.safaribooksonline.de/9780470740576</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed source coding theory, algorithms, and applications ent://SD_ILS/0/SD_ILS:146491 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Dragotti, Pier Luigi.&#160;Gastpar, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744852">http://www.sciencedirect.com/science/book/9780123744852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Independent Component Analysis and Signal Separation 8th International Conference, ICA 2009, Paraty, Brazil, March 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189742 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Adali, T&uuml;lay. editor.&#160;Jutten, Christian. editor.&#160;Romano, Jo&atilde;o Marcos Travassos. editor.&#160;Barros, Allan Kardec. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00599-2">http://dx.doi.org/10.1007/978-3-642-00599-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190377 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Park, Jong Hyuk. editor.&#160;Chen, Hsiao-Hwa. editor.&#160;Atiquzzaman, Mohammed. editor.&#160;Lee, Changhoon. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190378 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190382 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Park, Jong Hyuk. editor.&#160;Zhan, Justin. editor.&#160;Lee, Changhoon. editor.&#160;Wang, Guilin. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers ent://SD_ILS/0/SD_ILS:190589 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Dunkelman, Orr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03317-9">http://dx.doi.org/10.1007/978-3-642-03317-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190600 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Halevi, Shai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190634 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Degano, Pierpaolo. editor.&#160;Vigan&ograve;, Luca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Science Logic 23rd international Workshop, CSL 2009, 18th Annual Conference of the EACSL, Coimbra, Portugal, September 7-11, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190814 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gr&auml;del, Erich. editor.&#160;Kahle, Reinhard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04027-6">http://dx.doi.org/10.1007/978-3-642-04027-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190848 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Clavier, Christophe. editor.&#160;Gaj, Kris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188570 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Oswald, Elisabeth. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188808 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Golomb, Solomon W. editor.&#160;Parker, Matthew G. editor.&#160;Pott, Alexander. editor.&#160;Winterhof, Arne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188850 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Barbero, &Aacute;ngela. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189090 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Chen, Liqun. editor.&#160;Ryan, Mark D. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189188 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Schulzrinne, Henning. editor.&#160;State, Radu. editor.&#160;Niccolini, Saverio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185849 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gathen, Joachim. editor.&#160;Ima&ntilde;a, Jos&eacute; Luis. editor.&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189113 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Baek, Joonsang. editor.&#160;Bao, Feng. editor.&#160;Chen, Kefei. editor.&#160;Lai, Xuejia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Methods in Computer Science Essays in Memory of Thomas Beth ent://SD_ILS/0/SD_ILS:189380 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Calmet, Jacques. editor.&#160;Geiselmann, Willi. editor.&#160;M&uuml;ller-Quade, J&ouml;rn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:189415 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Coding An Introduction ent://SD_ILS/0/SD_ILS:238388 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ho, Tracey.&#160;Lun, Desmond.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511754623">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:166422 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:167026 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Saeed, Khalid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185962 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:186153 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handover in DVB-H Investigation and Analysis ent://SD_ILS/0/SD_ILS:188193 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Yang, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78630-6">http://dx.doi.org/10.1007/978-3-540-78630-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186734 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Carlet, Claude. editor.&#160;Sunar, Berk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Independent Component Analysis and Signal Separation 7th International Conference, ICA 2007, London, UK, September 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187178 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Davies, Mike E. editor.&#160;James, Christopher J. editor.&#160;Abdallah, Samer A. editor.&#160;Plumbley, Mark D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74494-8">http://dx.doi.org/10.1007/978-3-540-74494-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187216 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Biryukov, Alex. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187819 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bozta&#351;, Serdar. editor.&#160;Lu, Hsiao-Feng (Francis). editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:187862 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Golomb, Solomon W. editor.&#160;Gong, Guang. editor.&#160;Helleseth, Tor. editor.&#160;Song, Hong-Yeop. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:185053 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bauer, Friedrich L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:169437 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187389 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bondavalli, Andrea. editor.&#160;Brasileiro, Francisco. editor.&#160;Rajsbaum, Sergio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187440 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ziviani, Nivio. editor.&#160;Baeza-Yates, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184864 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Crestani, Fabio. editor.&#160;Ferragina, Paolo. editor.&#160;Sanderson, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184267 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ytrehus, &Oslash;yvind. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184257 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Batten, Lynn Margaret. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:184391 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedings ent://SD_ILS/0/SD_ILS:184780 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gong, Guang. editor.&#160;Helleseth, Tor. editor.&#160;Song, Hong-Yeop. editor.&#160;Yang, Kyeongcheol. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:290332 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic Aspects of the Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:166179 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Cid, Carlos. author.&#160;Murphy, Sean. author.&#160;Robshaw, Matthew. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:166190 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Ding, Jintai. author.&#160;Gower, Jason E. author.&#160;Schmidt, Dieter S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:182625 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Fossorier, Marc P. C. editor.&#160;Imai, Hideki. editor.&#160;Lin, Shu. editor.&#160;Poli, Alain. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:183113 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Helleseth, Tor. editor.&#160;Sarwate, Dilip. editor.&#160;Song, Hong-Yeop. editor.&#160;Yang, Kyeongcheol. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183360 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Smart, Nigel P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Contemporary Cryptology ent://SD_ILS/0/SD_ILS:197889 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Catalano, Dario. author.&#160;Cramer, Ronald. author.&#160;Crescenzo, Giovanni. author.&#160;Darmg&aring;rd, Ivan. author.&#160;Pointcheval, David. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:176342 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Filiol, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182816 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gilbert, Henri. editor.&#160;Handschuh, Helena. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182830 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vector quantization and signal compression ent://SD_ILS/0/SD_ILS:79503 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Gersho, Allen.&#160;Gray, Robert M., 1943- ort. yaz.<br/>Preferred Shelf Number&#160;TK 5102.5 G45 1991<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The Beta equilibrium, stability, and transport codes applications to the design of stellarators ent://SD_ILS/0/SD_ILS:257866 2024-12-26T00:57:30Z 2024-12-26T00:57:30Z Author&#160;Bauer, Frances.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120828159">http://www.sciencedirect.com/science/book/9780120828159</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>