Search Results for Security, International - Narrowed by: Computational complexity.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$00252C$002bInternational$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-12-19T18:37:21ZAdvances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1971532024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973842024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1976032024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1947382024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959662024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1955782024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936562024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1924202024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1926492024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1910122024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1914912024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914942024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1897872024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892342024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1876812024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877202024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1837122024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Won, Dong Ho. editor. Kim, Seungjoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1851802024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852142024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Roy, Bimal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462024-12-19T18:37:21Z2024-12-19T18:37:21ZAuthor Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>