Search Results for Security. - Narrowed by: Coding theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-29T01:52:23Z Network Security ent://SD_ILS/0/SD_ILS:167094 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Huang, Scott C.-H. editor.&#160;MacCallum, David. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:181654 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Tr&#269;ek, Denis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483569 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484918 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Schwabe, Peter. editor.&#160;Th&eacute;riault, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484959 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486418 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lange, Tanja. editor.&#160;Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484089 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486956 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:484493 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Li, Kuan-Ching. editor.&#160;Chen, Xiaofeng. editor.&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:399710 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197201 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security ent://SD_ILS/0/SD_ILS:197164 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Shi, Yun Q. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197478 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Chim, Tat Wing. editor.&#160;Yuen, Tsz Hon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197603 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Pieprzyk, Josef. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195888 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Qing, Sihan. editor.&#160;Susilo, Willy. editor.&#160;Wang, Guilin. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195966 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lin, Dongdai. editor.&#160;Tsudik, Gene. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195249 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Robles, Rosslin John. editor.&#160;Balitanas, Maricel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193245 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Heng, Swee-Huay. editor.&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193656 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Heng, Swee-Huay. editor.&#160;Wright, Rebecca N. editor.&#160;Goi, Bok-Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193666 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Soriano, Miguel. editor.&#160;Qing, Sihan. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XI Special Issue on Security in Computing, Part II ent://SD_ILS/0/SD_ILS:193681 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17697-5">http://dx.doi.org/10.1007/978-3-642-17697-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191592 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris J. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration ent://SD_ILS/0/SD_ILS:190185 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Cortier, V&eacute;ronique. editor.&#160;Kirchner, Claude. editor.&#160;Okada, Mitsuhiro. editor.&#160;Sakurada, Hideki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190377 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Park, Jong Hyuk. editor.&#160;Chen, Hsiao-Hwa. editor.&#160;Atiquzzaman, Mohammed. editor.&#160;Lee, Changhoon. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190634 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Degano, Pierpaolo. editor.&#160;Vigan&ograve;, Luca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191012 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Pieprzyk, Josef. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191365 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Garay, Juan A. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10433-6">http://dx.doi.org/10.1007/978-3-642-10433-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190378 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190382 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Park, Jong Hyuk. editor.&#160;Zhan, Justin. editor.&#160;Lee, Changhoon. editor.&#160;Wang, Guilin. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191311 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kim, Haeng-kon. editor.&#160;Kim, Tai-hoon. editor.&#160;Kiumi, Akingbehin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191494 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;&#346;l&#281;zak, Dominik. editor.&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-Chi. editor.&#160;Arnett, Kirk P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189188 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Schulzrinne, Henning. editor.&#160;State, Radu. editor.&#160;Niccolini, Saverio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189090 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Chen, Liqun. editor.&#160;Ryan, Mark D. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189113 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Baek, Joonsang. editor.&#160;Bao, Feng. editor.&#160;Chen, Kefei. editor.&#160;Lai, Xuejia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185962 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187335 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Saglietti, Francesca. editor.&#160;Oster, Norbert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184859 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;G&oacute;rski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184257 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Batten, Lynn Margaret. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182830 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183068 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Winther, Rune. editor.&#160;Gran, Bj&oslash;rn Axel. editor.&#160;Dahll, Gustav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice /cWilliam Stallings. ent://SD_ILS/0/SD_ILS:93149 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK 5105.59 S25 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Blockchain &ndash; ICBC 2019 Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482874 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Joshi, James. editor. (orcid)0000-0003-4519-9802&#160;Nepal, Surya. editor.&#160;Zhang, Qi. editor.&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23404-1">https://doi.org/10.1007/978-3-030-23404-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4&ndash;8, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484895 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Matsui, Mitsuru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:485285 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483164 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483389 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484528 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486183 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486312 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Yoo, Chang D. editor.&#160;Shi, Yun-Qing. editor.&#160;Kim, Hyoung Joong. editor.&#160;Piva, Alessandro. editor. (orcid)0000-0002-3047-0519&#160;Kim, Gwangsu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486426 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Santini, Paolo. editor. (orcid)0000-0003-0631-3668&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484878 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Boldyreva, Alexandra. editor.&#160;Micciancio, Daniele. editor. (orcid)0000-0003-3323-9985&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399578 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:400625 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II ent://SD_ILS/0/SD_ILS:400626 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I ent://SD_ILS/0/SD_ILS:400627 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Nielsen, Jesper Buus. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400637 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Fan, Junfeng. editor.&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400329 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Shacham, Hovav. editor.&#160;Boldyreva, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encryption for Digital Content ent://SD_ILS/0/SD_ILS:171850 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kiayias, Aggelos. author.&#160;Pehlivanoglu, Serdar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Key Establishment ent://SD_ILS/0/SD_ILS:167859 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Choo, Kim-Kwang Raymond. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:166190 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Ding, Jintai. author.&#160;Gower, Jason E. author.&#160;Schmidt, Dieter S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Unbounded, Social Impact of Bright ICT Adoption IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21&ndash;22, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486868 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Dwivedi, Yogesh. editor. (orcid)0000-0002-5547-9990&#160;Ayaburi, Emmanuel. editor.&#160;Boateng, Richard. editor.&#160;Effah, John. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20671-0">https://doi.org/10.1007/978-3-030-20671-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper ent://SD_ILS/0/SD_ILS:484505 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Obaidat, Mohammad S. editor.&#160;Cabello, Enrique. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485620 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Choffnes, David. editor.&#160;Barcellos, Marinho. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15986-3">https://doi.org/10.1007/978-3-030-15986-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487000 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;De Capitani di Vimercati, Sabrina. editor. (orcid)0000-0003-0793-3551&#160;Ren, Yizhi. editor. (orcid)0000-0002-1421-9164&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20&ndash;22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:399081 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Lin, Yi-Bing. editor.&#160;Deng, Der-Jiunn. editor.&#160;You, Ilsun. editor.&#160;Lin, Chun-Cheng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:399621 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Vempaty, Aditya. author.&#160;Kailkhura, Bhavya. author.&#160;Varshney, Pramod K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399860 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061&#160;Andreev, Sergey. editor. (orcid)0000-0001-8223-3665&#160;Balandin, Sergey. editor. (orcid)0000-0003-3238-4830&#160;Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401454 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Beverly, Robert. editor.&#160;Smaragdakis, Georgios. editor.&#160;Feldmann, Anja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402655 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Nah, Fiona Fui-Hoon. editor.&#160;Xiao, Bo Sophia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:290669 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Ling, San, 1964-&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420079470">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied algebra : codes, ciphers, and discrete algorithms ent://SD_ILS/0/SD_ILS:312768 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Hardy, Darel W.&#160;Walker, Carol L., 1935-&#160;Richman, Fred, 1938-<br/>Preferred Shelf Number&#160;QA268 H37 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:290332 2024-11-29T01:52:23Z 2024-11-29T01:52:23Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>