Search Results for - Narrowed by: SpringerLink (Online service) - Coding theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300?2024-05-20T11:55:23ZError Correction Codes for Non-Volatile Memoriesent://SD_ILS/0/SD_ILS:5022562024-05-20T11:55:23Z2024-05-20T11:55:23Zby Micheloni, R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-8391-4">http://dx.doi.org/10.1007/978-1-4020-8391-4</a><br/>Format: Electronic Resources<br/>An Introduction to Kolmogorov Complexity and Its Applicationsent://SD_ILS/0/SD_ILS:5015962024-05-20T11:55:23Z2024-05-20T11:55:23Zby Li, Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49820-1">http://dx.doi.org/10.1007/978-0-387-49820-1</a><br/>Format: Electronic Resources<br/>Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5037912024-05-20T11:55:23Z2024-05-20T11:55:23Zby Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038032024-05-20T11:55:23Z2024-05-20T11:55:23Zby Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Electronic Resources<br/>Precoding Techniques for Digital Communication Systemsent://SD_ILS/0/SD_ILS:5016802024-05-20T11:55:23Z2024-05-20T11:55:23Zby Kuo, C.-C. Jay. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71769-2">http://dx.doi.org/10.1007/978-0-387-71769-2</a><br/>Format: Electronic Resources<br/>The Codes of Life The Rules of Macroevolutionent://SD_ILS/0/SD_ILS:5020652024-05-20T11:55:23Z2024-05-20T11:55:23Zby Barbieri, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6340-4">http://dx.doi.org/10.1007/978-1-4020-6340-4</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027592024-05-20T11:55:23Z2024-05-20T11:55:23Zby Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5028552024-05-20T11:55:23Z2024-05-20T11:55:23Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-05-20T11:55:23Z2024-05-20T11:55:23Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-05-20T11:55:23Z2024-05-20T11:55:23Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036882024-05-20T11:55:23Z2024-05-20T11:55:23Zby Barbero, Ángela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format: Electronic Resources<br/>Handover in DVB-H Investigation and Analysisent://SD_ILS/0/SD_ILS:5034052024-05-20T11:55:23Z2024-05-20T11:55:23Zby Yang, Xiaodong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78630-6">http://dx.doi.org/10.1007/978-3-540-78630-6</a><br/>Format: Electronic Resources<br/>Codes: An Introduction to Information Communication and Cryptographyent://SD_ILS/0/SD_ILS:5025372024-05-20T11:55:23Z2024-05-20T11:55:23Zby Biggs, N.L. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Electronic Resources<br/>A Concise Introduction to Software Engineeringent://SD_ILS/0/SD_ILS:5025412024-05-20T11:55:23Z2024-05-20T11:55:23Zby Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-302-6">http://dx.doi.org/10.1007/978-1-84800-302-6</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-05-20T11:55:23Z2024-05-20T11:55:23Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-05-20T11:55:23Z2024-05-20T11:55:23Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Analysis of Computer and Communication Networksent://SD_ILS/0/SD_ILS:5017882024-05-20T11:55:23Z2024-05-20T11:55:23Zby Gebali, Fayez. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74437-7">http://dx.doi.org/10.1007/978-0-387-74437-7</a><br/>Format: Electronic Resources<br/>Advances in Applied Self-organizing Systemsent://SD_ILS/0/SD_ILS:5024482024-05-20T11:55:23Z2024-05-20T11:55:23Zby Prokopenko, Mikhail. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-982-8">http://dx.doi.org/10.1007/978-1-84628-982-8</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-20T11:55:23Z2024-05-20T11:55:23Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Advances in Information Systems Research, Education and Practice IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015422024-05-20T11:55:23Z2024-05-20T11:55:23Zby Avison, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09682-7">http://dx.doi.org/10.1007/978-0-387-09682-7</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5019572024-05-20T11:55:23Z2024-05-20T11:55:23Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format: Electronic Resources<br/>Open Source Approaches in Spatial Data Handlingent://SD_ILS/0/SD_ILS:5030682024-05-20T11:55:23Z2024-05-20T11:55:23Zby Hall, G. Brent. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74831-1">http://dx.doi.org/10.1007/978-3-540-74831-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-05-20T11:55:23Z2024-05-20T11:55:23Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037772024-05-20T11:55:23Z2024-05-20T11:55:23Zby Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036662024-05-20T11:55:23Z2024-05-20T11:55:23Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-05-20T11:55:23Z2024-05-20T11:55:23Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-05-20T11:55:23Z2024-05-20T11:55:23Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>Foundations and Applications of Sensor Managementent://SD_ILS/0/SD_ILS:5015952024-05-20T11:55:23Z2024-05-20T11:55:23Zby Hero, Alfred O. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49819-5">http://dx.doi.org/10.1007/978-0-387-49819-5</a><br/>Format: Electronic Resources<br/>Hypercomputation Computing Beyond the Church-Turing Barrierent://SD_ILS/0/SD_ILS:5016002024-05-20T11:55:23Z2024-05-20T11:55:23Zby Syropoulos, Apostolos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49970-3">http://dx.doi.org/10.1007/978-0-387-49970-3</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Computer Science Essays in Memory of Thomas Bethent://SD_ILS/0/SD_ILS:5038492024-05-20T11:55:23Z2024-05-20T11:55:23Zby Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-05-20T11:55:23Z2024-05-20T11:55:23Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:5118682024-05-20T11:55:23Z2024-05-20T11:55:23Zby Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Independent Component Analysis and Signal Separation 7th International Conference, ICA 2007, London, UK, September 9-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128012024-05-20T11:55:23Z2024-05-20T11:55:23Zby Davies, Mike E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74494-8">http://dx.doi.org/10.1007/978-3-540-74494-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712024-05-20T11:55:23Z2024-05-20T11:55:23Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Quantum Decoherence Poincaré Seminar 2005ent://SD_ILS/0/SD_ILS:5131932024-05-20T11:55:23Z2024-05-20T11:55:23Zby Duplantier, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-7808-0">http://dx.doi.org/10.1007/978-3-7643-7808-0</a><br/>Format: Electronic Resources<br/>Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128992024-05-20T11:55:23Z2024-05-20T11:55:23Zby Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format: Electronic Resources<br/>String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129182024-05-20T11:55:23Z2024-05-20T11:55:23Zby Ziviani, Nivio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-05-20T11:55:23Z2024-05-20T11:55:23Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-05-20T11:55:23Z2024-05-20T11:55:23Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232024-05-20T11:55:23Z2024-05-20T11:55:23Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papersent://SD_ILS/0/SD_ILS:5130372024-05-20T11:55:23Z2024-05-20T11:55:23Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format: Electronic Resources<br/>Asymmetry: The Foundation of Informationent://SD_ILS/0/SD_ILS:5122002024-05-20T11:55:23Z2024-05-20T11:55:23Zby Muller, Scott J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format: Electronic Resources<br/>Turbo-like Codes Design for High Speed Decodingent://SD_ILS/0/SD_ILS:5076382024-05-20T11:55:23Z2024-05-20T11:55:23Zby Abbasfar, Aliazam. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6391-6">http://dx.doi.org/10.1007/978-1-4020-6391-6</a><br/>Format: Electronic Resources<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:5072292024-05-20T11:55:23Z2024-05-20T11:55:23Zby Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Psychoacoustics Facts and Modelsent://SD_ILS/0/SD_ILS:5121172024-05-20T11:55:23Z2024-05-20T11:55:23Zby Fastl, Hugo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68888-4">http://dx.doi.org/10.1007/978-3-540-68888-4</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142024-05-20T11:55:23Z2024-05-20T11:55:23Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Information and Complexity in Statistical Modelingent://SD_ILS/0/SD_ILS:5058272024-05-20T11:55:23Z2024-05-20T11:55:23Zby Rissanen, Jorma. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68812-1">http://dx.doi.org/10.1007/978-0-387-68812-1</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-05-20T11:55:23Z2024-05-20T11:55:23Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Entropy, Search, Complexityent://SD_ILS/0/SD_ILS:5107562024-05-20T11:55:23Z2024-05-20T11:55:23Zby Csiszár, Imre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-32777-6">http://dx.doi.org/10.1007/978-3-540-32777-6</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-05-20T11:55:23Z2024-05-20T11:55:23Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Introduction to Biosemiotics The New Biological Synthesisent://SD_ILS/0/SD_ILS:5070242024-05-20T11:55:23Z2024-05-20T11:55:23Zby Barbieri, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-4814-9">http://dx.doi.org/10.1007/1-4020-4814-9</a><br/>Format: Electronic Resources<br/>Variable-length Codes for Data Compressionent://SD_ILS/0/SD_ILS:5087172024-05-20T11:55:23Z2024-05-20T11:55:23Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format: Electronic Resources<br/>Data Compression The Complete Referenceent://SD_ILS/0/SD_ILS:5085982024-05-20T11:55:23Z2024-05-20T11:55:23Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-05-20T11:55:23Z2024-05-20T11:55:23Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125902024-05-20T11:55:23Z2024-05-20T11:55:23Zby Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128142024-05-20T11:55:23Z2024-05-20T11:55:23Zby Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130202024-05-20T11:55:23Z2024-05-20T11:55:23Zby Boztaş, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882024-05-20T11:55:23Z2024-05-20T11:55:23Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117322024-05-20T11:55:23Z2024-05-20T11:55:23Zby Górski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarityent://SD_ILS/0/SD_ILS:5089292024-05-20T11:55:23Z2024-05-20T11:55:23Zby Schroeder, Manfred R. author.<br/><a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format: Electronic Resources<br/>Managing Information Systems Security and Privacyent://SD_ILS/0/SD_ILS:5093672024-05-20T11:55:23Z2024-05-20T11:55:23Zby Trček, Denis. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-05-20T11:55:23Z2024-05-20T11:55:23Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5049632024-05-20T11:55:23Z2024-05-20T11:55:23Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format: Electronic Resources<br/>Orthogonal Frequency Division Multiplexing for Wireless Communicationsent://SD_ILS/0/SD_ILS:5049782024-05-20T11:55:23Z2024-05-20T11:55:23Zby Li, Ye. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30235-2">http://dx.doi.org/10.1007/0-387-30235-2</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-05-20T11:55:23Z2024-05-20T11:55:23Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Classification Algorithms for Codes and Designsent://SD_ILS/0/SD_ILS:5095312024-05-20T11:55:23Z2024-05-20T11:55:23Zby Kaski, Petteri. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28991-7">http://dx.doi.org/10.1007/3-540-28991-7</a><br/>Format: Electronic Resources<br/>Error-Correcting Linear Codes Classification by Isometry and Applicationsent://SD_ILS/0/SD_ILS:5101452024-05-20T11:55:23Z2024-05-20T11:55:23Zby Betten, Anton. author.<br/><a href="http://dx.doi.org/10.1007/3-540-31703-1">http://dx.doi.org/10.1007/3-540-31703-1</a><br/>Format: Electronic Resources<br/>String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117372024-05-20T11:55:23Z2024-05-20T11:55:23Zby Crestani, Fabio. editor.<br/><a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-05-20T11:55:23Z2024-05-20T11:55:23Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-05-20T11:55:23Z2024-05-20T11:55:23Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-05-20T11:55:23Z2024-05-20T11:55:23Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-05-20T11:55:23Z2024-05-20T11:55:23Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-05-20T11:55:23Z2024-05-20T11:55:23Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5099192024-05-20T11:55:23Z2024-05-20T11:55:23Zby Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-05-20T11:55:23Z2024-05-20T11:55:23Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications – SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116782024-05-20T11:55:23Z2024-05-20T11:55:23Zby Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5113882024-05-20T11:55:23Z2024-05-20T11:55:23Zby Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format: Electronic Resources<br/>Coordinated Multiuser Communicationsent://SD_ILS/0/SD_ILS:5067292024-05-20T11:55:23Z2024-05-20T11:55:23Zby Schlegel, Christian. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-4075-X">http://dx.doi.org/10.1007/1-4020-4075-X</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-05-20T11:55:23Z2024-05-20T11:55:23Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Independent Component Analysis and Blind Signal Separation 6th International Conference, ICA 2006, Charleston, SC, USA, March 5-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107212024-05-20T11:55:23Z2024-05-20T11:55:23Zby Rosca, Justinian. editor.<br/><a href="http://dx.doi.org/10.1007/11679363">http://dx.doi.org/10.1007/11679363</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-05-20T11:55:23Z2024-05-20T11:55:23Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Self-Dual Codes and Invariant Theoryent://SD_ILS/0/SD_ILS:5097902024-05-20T11:55:23Z2024-05-20T11:55:23Zby Nebe, Gabriele. author.<br/><a href="http://dx.doi.org/10.1007/3-540-30731-1">http://dx.doi.org/10.1007/3-540-30731-1</a><br/>Format: Electronic Resources<br/>Algorithmic Information Theory Mathematics of Digital Informationent://SD_ILS/0/SD_ILS:5108792024-05-20T11:55:23Z2024-05-20T11:55:23Zby Seibt, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-33219-0">http://dx.doi.org/10.1007/978-3-540-33219-0</a><br/>Format: Electronic Resources<br/>Contemporary Cryptologyent://SD_ILS/0/SD_ILS:5130992024-05-20T11:55:23Z2024-05-20T11:55:23Zby Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Complexity Theory Exploring the Limits of Efficient Algorithmsent://SD_ILS/0/SD_ILS:5092402024-05-20T11:55:23Z2024-05-20T11:55:23Zby Wegener, Ingo. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27477-4">http://dx.doi.org/10.1007/3-540-27477-4</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-05-20T11:55:23Z2024-05-20T11:55:23Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Optical Communication Theory and Techniquesent://SD_ILS/0/SD_ILS:5041072024-05-20T11:55:23Z2024-05-20T11:55:23Zby Forestieri, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/b100765">http://dx.doi.org/10.1007/b100765</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-05-20T11:55:23Z2024-05-20T11:55:23Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>XML for Bioinformaticsent://SD_ILS/0/SD_ILS:5046392024-05-20T11:55:23Z2024-05-20T11:55:23Zby Cerami, Ethan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27478-2">http://dx.doi.org/10.1007/0-387-27478-2</a><br/>Format: Electronic Resources<br/>The Multimedia Internetent://SD_ILS/0/SD_ILS:5046692024-05-20T11:55:23Z2024-05-20T11:55:23Zby Weinstein, Stephen. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27603-3">http://dx.doi.org/10.1007/0-387-27603-3</a><br/>Format: Electronic Resources<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:5046002024-05-20T11:55:23Z2024-05-20T11:55:23Zby Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5104112024-05-20T11:55:23Z2024-05-20T11:55:23Zby Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106442024-05-20T11:55:23Z2024-05-20T11:55:23Zby Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-05-20T11:55:23Z2024-05-20T11:55:23Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Principles of Spread-Spectrum Communication Systemsent://SD_ILS/0/SD_ILS:5040642024-05-20T11:55:23Z2024-05-20T11:55:23Zby Torrieri, Don. author.<br/><a href="http://dx.doi.org/10.1007/b99535">http://dx.doi.org/10.1007/b99535</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792024-05-20T11:55:23Z2024-05-20T11:55:23Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>An Integrated Approach to Software Engineeringent://SD_ILS/0/SD_ILS:5047362024-05-20T11:55:23Z2024-05-20T11:55:23Zby Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28132-0">http://dx.doi.org/10.1007/0-387-28132-0</a><br/>Format: Electronic Resources<br/>Statistical and Inductive Inference by Minimum Message Lengthent://SD_ILS/0/SD_ILS:5046852024-05-20T11:55:23Z2024-05-20T11:55:23Zby Wallace, C.S. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27656-4">http://dx.doi.org/10.1007/0-387-27656-4</a><br/>Format: Electronic Resources<br/>Communication Systemsent://SD_ILS/0/SD_ILS:5045852024-05-20T11:55:23Z2024-05-20T11:55:23Zby Alencar, Marcelo S. author.<br/><a href="http://dx.doi.org/10.1007/b138483">http://dx.doi.org/10.1007/b138483</a><br/>Format: Electronic Resources<br/>Turbo Code Applications A Journey from a Paper to Realizationent://SD_ILS/0/SD_ILS:5065692024-05-20T11:55:23Z2024-05-20T11:55:23Zby Sripimanwat, Keattisak. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3685-X">http://dx.doi.org/10.1007/1-4020-3685-X</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101212024-05-20T11:55:23Z2024-05-20T11:55:23Zby Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format: Electronic Resources<br/>Universal Artificial Intellegence Sequential Decisions Based on Algorithmic Probabilityent://SD_ILS/0/SD_ILS:5090232024-05-20T11:55:23Z2024-05-20T11:55:23Zby Hutter, Marcus. author.<br/><a href="http://dx.doi.org/10.1007/b138233">http://dx.doi.org/10.1007/b138233</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322024-05-20T11:55:23Z2024-05-20T11:55:23Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101352024-05-20T11:55:23Z2024-05-20T11:55:23Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>List Decoding of Error-Correcting Codes Winning Thesis of the 2002 ACM Doctoral Dissertation Competitionent://SD_ILS/0/SD_ILS:5096752024-05-20T11:55:23Z2024-05-20T11:55:23Zby Guruswami, Venkatesan. author.<br/><a href="http://dx.doi.org/10.1007/b104335">http://dx.doi.org/10.1007/b104335</a><br/>Format: Electronic Resources<br/>Dependable Computing Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104522024-05-20T11:55:23Z2024-05-20T11:55:23Zby Maziero, Carlos Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/11572329">http://dx.doi.org/10.1007/11572329</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103662024-05-20T11:55:23Z2024-05-20T11:55:23Zby Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Coding for Wireless Channelsent://SD_ILS/0/SD_ILS:5076952024-05-20T11:55:23Z2024-05-20T11:55:23Zby Biglieri, Ezio. author.<br/><a href="http://dx.doi.org/10.1007/b136517">http://dx.doi.org/10.1007/b136517</a><br/>Format: Electronic Resources<br/>