Search Results for LIN. - Narrowed by: Coding theory.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLIN.$0026qf$003dSUBJECT$002509Konu$002509Coding$002btheory.$002509Coding$002btheory.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2026-01-19T13:39:36Z
Design of network coding schemes in wireless networks
ent://SD_ILS/0/SD_ILS:581934
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Zihuai, author.<br/>Preferred Shelf Number TK5102.92<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003203803">https://www.taylorfrancis.com/books/9781003203803</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:483055
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Dongdai. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486955
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Dongdai. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:399081
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Lin, Yi-Bing. editor. Deng, Der-Jiunn. editor. You, Ilsun. editor. Lin, Chun-Cheng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:182625
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Fossorier, Marc P. C. editor. Imai, Hideki. editor. Lin, Shu. editor. Poli, Alain. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ubiquitous Computing Application and Wireless Sensor UCAWSN-14
ent://SD_ILS/0/SD_ILS:530612
2026-01-19T13:39:36Z
2026-01-19T13:39:36Z
Author Park, James J. (Jong Hyuk). editor. Pan, Yi. editor. Chao, Han-Chieh. editor. Yi, Gangman. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-94-017-9618-7">https://doi.org/10.1007/978-94-017-9618-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>