Search Results for - Narrowed by: 2006 - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-06-18T23:07:11ZUnderstanding Intrusion Detection Through Visualizationent://SD_ILS/0/SD_ILS:5046782024-06-18T23:07:11Z2024-06-18T23:07:11Zby Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-06-18T23:07:11Z2024-06-18T23:07:11Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-06-18T23:07:11Z2024-06-18T23:07:11Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Handbook of Multibiometricsent://SD_ILS/0/SD_ILS:5051862024-06-18T23:07:11Z2024-06-18T23:07:11Zby Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-06-18T23:07:11Z2024-06-18T23:07:11Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108432024-06-18T23:07:11Z2024-06-18T23:07:11Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format: Electronic Resources<br/>Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114212024-06-18T23:07:11Z2024-06-18T23:07:11Zby Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119662024-06-18T23:07:11Z2024-06-18T23:07:11Zby Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-06-18T23:07:11Z2024-06-18T23:07:11Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5121532024-06-18T23:07:11Z2024-06-18T23:07:11Zby Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120002024-06-18T23:07:11Z2024-06-18T23:07:11Zby Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116142024-06-18T23:07:11Z2024-06-18T23:07:11Zby Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11839569">http://dx.doi.org/10.1007/11839569</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072024-06-18T23:07:11Z2024-06-18T23:07:11Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-06-18T23:07:11Z2024-06-18T23:07:11Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-06-18T23:07:11Z2024-06-18T23:07:11Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-06-18T23:07:11Z2024-06-18T23:07:11Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116522024-06-18T23:07:11Z2024-06-18T23:07:11Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format: Electronic Resources<br/>Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5116632024-06-18T23:07:11Z2024-06-18T23:07:11Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-06-18T23:07:11Z2024-06-18T23:07:11Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-06-18T23:07:11Z2024-06-18T23:07:11Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Access Control Systems Security, Identity Management and Trust Modelsent://SD_ILS/0/SD_ILS:5046922024-06-18T23:07:11Z2024-06-18T23:07:11Zby Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-06-18T23:07:11Z2024-06-18T23:07:11Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Information Assurance Security in the Information Environmentent://SD_ILS/0/SD_ILS:5085712024-06-18T23:07:11Z2024-06-18T23:07:11Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications – SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116782024-06-18T23:07:11Z2024-06-18T23:07:11Zby Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5099192024-06-18T23:07:11Z2024-06-18T23:07:11Zby Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812024-06-18T23:07:11Z2024-06-18T23:07:11Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2006 The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5107262024-06-18T23:07:11Z2024-06-18T23:07:11Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-06-18T23:07:11Z2024-06-18T23:07:11Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Quality of Protection Security Measurements and Metricsent://SD_ILS/0/SD_ILS:5054322024-06-18T23:07:11Z2024-06-18T23:07:11Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-06-18T23:07:11Z2024-06-18T23:07:11Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-06-18T23:07:11Z2024-06-18T23:07:11Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Trusted Platform Module Basics : Using TPM in Embedded Systems.ent://SD_ILS/0/SD_ILS:11891162024-06-18T23:07:11Z2024-06-18T23:07:11Zby Kinney, Steven L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274719">Click to View</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101792024-06-18T23:07:11Z2024-06-18T23:07:11Zby Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-06-18T23:07:11Z2024-06-18T23:07:11Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109082024-06-18T23:07:11Z2024-06-18T23:07:11Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492024-06-18T23:07:11Z2024-06-18T23:07:11Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882024-06-18T23:07:11Z2024-06-18T23:07:11Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Ient://SD_ILS/0/SD_ILS:5119372024-06-18T23:07:11Z2024-06-18T23:07:11Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-06-18T23:07:11Z2024-06-18T23:07:11Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-06-18T23:07:11Z2024-06-18T23:07:11Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862024-06-18T23:07:11Z2024-06-18T23:07:11Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Embedded Security in Cars Securing Current and Future Automotive IT Applicationsent://SD_ILS/0/SD_ILS:5094242024-06-18T23:07:11Z2024-06-18T23:07:11Zby Lemke, Kerstin. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28428-1">http://dx.doi.org/10.1007/3-540-28428-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5109162024-06-18T23:07:11Z2024-06-18T23:07:11Zby Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Electronic Resources<br/>Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108512024-06-18T23:07:11Z2024-06-18T23:07:11Zby Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-06-18T23:07:11Z2024-06-18T23:07:11Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113452024-06-18T23:07:11Z2024-06-18T23:07:11Zby Büschkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format: Electronic Resources<br/>Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119152024-06-18T23:07:11Z2024-06-18T23:07:11Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format: Electronic Resources<br/>Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5115742024-06-18T23:07:11Z2024-06-18T23:07:11Zby Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-18T23:07:11Z2024-06-18T23:07:11Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732024-06-18T23:07:11Z2024-06-18T23:07:11Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-06-18T23:07:11Z2024-06-18T23:07:11Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121422024-06-18T23:07:11Z2024-06-18T23:07:11Zby Buttyán, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522024-06-18T23:07:11Z2024-06-18T23:07:11Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118572024-06-18T23:07:11Z2024-06-18T23:07:11Zby Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format: Electronic Resources<br/>Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115982024-06-18T23:07:11Z2024-06-18T23:07:11Zby Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-06-18T23:07:11Z2024-06-18T23:07:11Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-06-18T23:07:11Z2024-06-18T23:07:11Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111602024-06-18T23:07:11Z2024-06-18T23:07:11Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format: Electronic Resources<br/>Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111822024-06-18T23:07:11Z2024-06-18T23:07:11Zby Müller, Günter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5113882024-06-18T23:07:11Z2024-06-18T23:07:11Zby Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120152024-06-18T23:07:11Z2024-06-18T23:07:11Zby Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format: Electronic Resources<br/>Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115662024-06-18T23:07:11Z2024-06-18T23:07:11Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-18T23:07:11Z2024-06-18T23:07:11Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5121102024-06-18T23:07:11Z2024-06-18T23:07:11Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-06-18T23:07:11Z2024-06-18T23:07:11Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-06-18T23:07:11Z2024-06-18T23:07:11Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:5049242024-06-18T23:07:11Z2024-06-18T23:07:11Zby Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-06-18T23:07:11Z2024-06-18T23:07:11Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Theoretical Computer Science Essays in Memory of Shimon Evenent://SD_ILS/0/SD_ILS:5107832024-06-18T23:07:11Z2024-06-18T23:07:11Zby Goldreich, Oded. editor.<br/><a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114342024-06-18T23:07:11Z2024-06-18T23:07:11Zby Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-06-18T23:07:11Z2024-06-18T23:07:11Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Algorithmic Number Theory 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113562024-06-18T23:07:11Z2024-06-18T23:07:11Zby Hess, Florian. editor.<br/><a href="http://dx.doi.org/10.1007/11792086">http://dx.doi.org/10.1007/11792086</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119422024-06-18T23:07:11Z2024-06-18T23:07:11Zby Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992024-06-18T23:07:11Z2024-06-18T23:07:11Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118172024-06-18T23:07:11Z2024-06-18T23:07:11Zby Goubin, Louis. editor.<br/><a href="http://dx.doi.org/10.1007/11894063">http://dx.doi.org/10.1007/11894063</a><br/>Format: Electronic Resources<br/>