Search Results for - Narrowed by: Algorithm Analysis and Problem Complexity. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-20T12:53:36Z Combinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085600 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627<br/><a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Performance Engineering 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085400 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Bakhshi, Rena. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02227-3">https://doi.org/10.1007/978-3-030-02227-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085150 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Ren, Jinchang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085552 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085367 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085369 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085862 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085376 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends and Future Technology in Applied Intelligence 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085286 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Mouhoub, Malek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92058-0">https://doi.org/10.1007/978-3-319-92058-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Methodologies 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085307 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Huang, De-Shuang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95957-3">https://doi.org/10.1007/978-3-319-95957-3</a><br/>Format:&#160;Electronic Resources<br/> Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085131 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Theories and Application 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085133 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Huang, De-Shuang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95933-7">https://doi.org/10.1007/978-3-319-95933-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2018 15th International Symposium on Neural Networks, ISNN 2018, Minsk, Belarus, June 25&ndash;28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085487 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Huang, Tingwen. editor. (orcid)0000-0001-9610-846X<br/><a href="https://doi.org/10.1007/978-3-319-92537-0">https://doi.org/10.1007/978-3-319-92537-0</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:2086488 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085045 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085703 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085778 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085790 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12&ndash;14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085972 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084619 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085218 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085235 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085557 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085224 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086096 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085089 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085675 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085680 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Kordy, Barbara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46263-9">https://doi.org/10.1007/978-3-319-46263-9</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085713 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-06-20T12:53:36Z 2024-06-20T12:53:36Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/>