Search Results for - Narrowed by: SpringerLink (Online service) - Coding theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300? 2024-05-20T11:55:23Z Error Correction Codes for Non-Volatile Memories ent://SD_ILS/0/SD_ILS:502256 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Micheloni, R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-8391-4">http://dx.doi.org/10.1007/978-1-4020-8391-4</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to Kolmogorov Complexity and Its Applications ent://SD_ILS/0/SD_ILS:501596 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Li, Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49820-1">http://dx.doi.org/10.1007/978-0-387-49820-1</a><br/>Format:&#160;Electronic Resources<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503791 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503803 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/> Precoding Techniques for Digital Communication Systems ent://SD_ILS/0/SD_ILS:501680 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Kuo, C.-C. Jay. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71769-2">http://dx.doi.org/10.1007/978-0-387-71769-2</a><br/>Format:&#160;Electronic Resources<br/> The Codes of Life The Rules of Macroevolution ent://SD_ILS/0/SD_ILS:502065 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Barbieri, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6340-4">http://dx.doi.org/10.1007/978-1-4020-6340-4</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502759 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:502855 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:501584 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503688 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Barbero, &Aacute;ngela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format:&#160;Electronic Resources<br/> Handover in DVB-H Investigation and Analysis ent://SD_ILS/0/SD_ILS:503405 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Yang, Xiaodong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78630-6">http://dx.doi.org/10.1007/978-3-540-78630-6</a><br/>Format:&#160;Electronic Resources<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:502537 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Biggs, N.L. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/> A Concise Introduction to Software Engineering ent://SD_ILS/0/SD_ILS:502541 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-302-6">http://dx.doi.org/10.1007/978-1-84800-302-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Analysis of Computer and Communication Networks ent://SD_ILS/0/SD_ILS:501788 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Gebali, Fayez. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74437-7">http://dx.doi.org/10.1007/978-0-387-74437-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Applied Self-organizing Systems ent://SD_ILS/0/SD_ILS:502448 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Prokopenko, Mikhail. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-982-8">http://dx.doi.org/10.1007/978-1-84628-982-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Systems Research, Education and Practice IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501542 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Avison, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09682-7">http://dx.doi.org/10.1007/978-0-387-09682-7</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:501957 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format:&#160;Electronic Resources<br/> Open Source Approaches in Spatial Data Handling ent://SD_ILS/0/SD_ILS:503068 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Hall, G. Brent. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74831-1">http://dx.doi.org/10.1007/978-3-540-74831-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503777 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503666 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:503859 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503576 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Applications of Sensor Management ent://SD_ILS/0/SD_ILS:501595 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Hero, Alfred O. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49819-5">http://dx.doi.org/10.1007/978-0-387-49819-5</a><br/>Format:&#160;Electronic Resources<br/> Hypercomputation Computing Beyond the Church-Turing Barrier ent://SD_ILS/0/SD_ILS:501600 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Syropoulos, Apostolos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49970-3">http://dx.doi.org/10.1007/978-0-387-49970-3</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Methods in Computer Science Essays in Memory of Thomas Beth ent://SD_ILS/0/SD_ILS:503849 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:511868 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/> Independent Component Analysis and Signal Separation 7th International Conference, ICA 2007, London, UK, September 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512801 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Davies, Mike E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74494-8">http://dx.doi.org/10.1007/978-3-540-74494-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512871 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/> Quantum Decoherence Poincar&eacute; Seminar 2005 ent://SD_ILS/0/SD_ILS:513193 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Duplantier, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-7808-0">http://dx.doi.org/10.1007/978-3-7643-7808-0</a><br/>Format:&#160;Electronic Resources<br/> Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512899 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format:&#160;Electronic Resources<br/> String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512918 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Ziviani, Nivio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:511946 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513023 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:513037 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/> Asymmetry: The Foundation of Information ent://SD_ILS/0/SD_ILS:512200 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Muller, Scott J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format:&#160;Electronic Resources<br/> Turbo-like Codes Design for High Speed Decoding ent://SD_ILS/0/SD_ILS:507638 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Abbasfar, Aliazam. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6391-6">http://dx.doi.org/10.1007/978-1-4020-6391-6</a><br/>Format:&#160;Electronic Resources<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:507229 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/> Psychoacoustics Facts and Models ent://SD_ILS/0/SD_ILS:512117 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Fastl, Hugo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68888-4">http://dx.doi.org/10.1007/978-3-540-68888-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> Information and Complexity in Statistical Modeling ent://SD_ILS/0/SD_ILS:505827 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Rissanen, Jorma. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68812-1">http://dx.doi.org/10.1007/978-0-387-68812-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:505571 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/> Entropy, Search, Complexity ent://SD_ILS/0/SD_ILS:510756 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Csisz&aacute;r, Imre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-32777-6">http://dx.doi.org/10.1007/978-3-540-32777-6</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:505628 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Biosemiotics The New Biological Synthesis ent://SD_ILS/0/SD_ILS:507024 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Barbieri, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-4814-9">http://dx.doi.org/10.1007/1-4020-4814-9</a><br/>Format:&#160;Electronic Resources<br/> Variable-length Codes for Data Compression ent://SD_ILS/0/SD_ILS:508717 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format:&#160;Electronic Resources<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:508598 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:505612 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512590 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512814 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513020 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Boztaş, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511288 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Ytrehus, &Oslash;yvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511732 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;G&oacute;rski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:508929 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Schroeder, Manfred R. author.<br/><a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:509367 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Trček, Denis. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:504916 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:504963 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format:&#160;Electronic Resources<br/> Orthogonal Frequency Division Multiplexing for Wireless Communications ent://SD_ILS/0/SD_ILS:504978 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Li, Ye. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30235-2">http://dx.doi.org/10.1007/0-387-30235-2</a><br/>Format:&#160;Electronic Resources<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:504953 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/> Classification Algorithms for Codes and Designs ent://SD_ILS/0/SD_ILS:509531 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Kaski, Petteri. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28991-7">http://dx.doi.org/10.1007/3-540-28991-7</a><br/>Format:&#160;Electronic Resources<br/> Error-Correcting Linear Codes Classification by Isometry and Applications ent://SD_ILS/0/SD_ILS:510145 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Betten, Anton. author.<br/><a href="http://dx.doi.org/10.1007/3-540-31703-1">http://dx.doi.org/10.1007/3-540-31703-1</a><br/>Format:&#160;Electronic Resources<br/> String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511737 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Crestani, Fabio. editor.<br/><a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format:&#160;Electronic Resources<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:505285 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:504837 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Baig&egrave;neres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Aspects of the Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:505451 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format:&#160;Electronic Resources<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:505464 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:504461 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:509919 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications &ndash; SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511678 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511388 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format:&#160;Electronic Resources<br/> Coordinated Multiuser Communications ent://SD_ILS/0/SD_ILS:506729 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Schlegel, Christian. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-4075-X">http://dx.doi.org/10.1007/1-4020-4075-X</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Independent Component Analysis and Blind Signal Separation 6th International Conference, ICA 2006, Charleston, SC, USA, March 5-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510721 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Rosca, Justinian. editor.<br/><a href="http://dx.doi.org/10.1007/11679363">http://dx.doi.org/10.1007/11679363</a><br/>Format:&#160;Electronic Resources<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> Self-Dual Codes and Invariant Theory ent://SD_ILS/0/SD_ILS:509790 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Nebe, Gabriele. author.<br/><a href="http://dx.doi.org/10.1007/3-540-30731-1">http://dx.doi.org/10.1007/3-540-30731-1</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Information Theory Mathematics of Digital Information ent://SD_ILS/0/SD_ILS:510879 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Seibt, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-33219-0">http://dx.doi.org/10.1007/978-3-540-33219-0</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptology ent://SD_ILS/0/SD_ILS:513099 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/> Complexity Theory Exploring the Limits of Efficient Algorithms ent://SD_ILS/0/SD_ILS:509240 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Wegener, Ingo. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27477-4">http://dx.doi.org/10.1007/3-540-27477-4</a><br/>Format:&#160;Electronic Resources<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:504226 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/> Optical Communication Theory and Techniques ent://SD_ILS/0/SD_ILS:504107 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Forestieri, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/b100765">http://dx.doi.org/10.1007/b100765</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> XML for Bioinformatics ent://SD_ILS/0/SD_ILS:504639 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Cerami, Ethan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27478-2">http://dx.doi.org/10.1007/0-387-27478-2</a><br/>Format:&#160;Electronic Resources<br/> The Multimedia Internet ent://SD_ILS/0/SD_ILS:504669 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Weinstein, Stephen. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27603-3">http://dx.doi.org/10.1007/0-387-27603-3</a><br/>Format:&#160;Electronic Resources<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:504600 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510411 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510644 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Principles of Spread-Spectrum Communication Systems ent://SD_ILS/0/SD_ILS:504064 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Torrieri, Don. author.<br/><a href="http://dx.doi.org/10.1007/b99535">http://dx.doi.org/10.1007/b99535</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:504179 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> An Integrated Approach to Software Engineering ent://SD_ILS/0/SD_ILS:504736 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28132-0">http://dx.doi.org/10.1007/0-387-28132-0</a><br/>Format:&#160;Electronic Resources<br/> Statistical and Inductive Inference by Minimum Message Length ent://SD_ILS/0/SD_ILS:504685 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Wallace, C.S. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27656-4">http://dx.doi.org/10.1007/0-387-27656-4</a><br/>Format:&#160;Electronic Resources<br/> Communication Systems ent://SD_ILS/0/SD_ILS:504585 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Alencar, Marcelo S. author.<br/><a href="http://dx.doi.org/10.1007/b138483">http://dx.doi.org/10.1007/b138483</a><br/>Format:&#160;Electronic Resources<br/> Turbo Code Applications A Journey from a Paper to Realization ent://SD_ILS/0/SD_ILS:506569 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Sripimanwat, Keattisak. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3685-X">http://dx.doi.org/10.1007/1-4020-3685-X</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510121 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/> Universal Artificial Intellegence Sequential Decisions Based on Algorithmic Probability ent://SD_ILS/0/SD_ILS:509023 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Hutter, Marcus. author.<br/><a href="http://dx.doi.org/10.1007/b138233">http://dx.doi.org/10.1007/b138233</a><br/>Format:&#160;Electronic Resources<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:508732 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> List Decoding of Error-Correcting Codes Winning Thesis of the 2002 ACM Doctoral Dissertation Competition ent://SD_ILS/0/SD_ILS:509675 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Guruswami, Venkatesan. author.<br/><a href="http://dx.doi.org/10.1007/b104335">http://dx.doi.org/10.1007/b104335</a><br/>Format:&#160;Electronic Resources<br/> Dependable Computing Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510452 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Maziero, Carlos Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/11572329">http://dx.doi.org/10.1007/11572329</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510366 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/> Coding for Wireless Channels ent://SD_ILS/0/SD_ILS:507695 2024-05-20T11:55:23Z 2024-05-20T11:55:23Z by&#160;Biglieri, Ezio. author.<br/><a href="http://dx.doi.org/10.1007/b136517">http://dx.doi.org/10.1007/b136517</a><br/>Format:&#160;Electronic Resources<br/>