Search Results for - Narrowed by: Algorithm Analysis and Problem Complexity. - Data encryption (Computer science). SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue? 2024-06-25T13:42:35Z Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085131 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format:&#160;Electronic Resources<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:2086769 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085552 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Random Numbers and Computers ent://SD_ILS/0/SD_ILS:2084432 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085567 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084619 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085045 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085235 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085743 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Freivalds, Rūsiņ&scaron; Mārtiņ&scaron;. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49192-8">https://doi.org/10.1007/978-3-662-49192-8</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085778 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085713 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085790 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085647 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Duquesne, Sylvain. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6&ndash;8, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085559 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30806-7">https://doi.org/10.1007/978-3-319-30806-7</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12&ndash;14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085972 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503666 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502759 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503662 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Wu, Tzong-Chen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503576 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502812 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:502699 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Number Theory 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503526 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Poorten, Alfred J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79456-1">http://dx.doi.org/10.1007/978-3-540-79456-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503503 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503800 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:502855 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503832 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502623 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503633 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503455 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512626 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security 10th International Conference, ISC 2007, Valpara&iacute;so, Chile, October 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512912 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512590 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:512594 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512680 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512276 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512974 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512986 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512999 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512814 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512660 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513020 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Boztaş, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512248 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512492 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512687 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513043 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/> Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ent://SD_ILS/0/SD_ILS:508723 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Tuyls, Pim. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513032 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511942 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511857 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511388 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511574 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511244 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511421 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512015 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512110 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2006 The Cryptographers&rsquo; Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510726 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Theoretical Computer Science Essays in Memory of Shimon Even ent://SD_ILS/0/SD_ILS:510783 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Goldreich, Oded. editor.<br/><a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510916 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510843 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510851 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510749 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Number Theory 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511356 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Hess, Florian. editor.<br/><a href="http://dx.doi.org/10.1007/11792086">http://dx.doi.org/10.1007/11792086</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:512135 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511915 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security I ent://SD_ILS/0/SD_ILS:511937 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511160 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512142 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Butty&aacute;n, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format:&#160;Electronic Resources<br/> Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511598 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2007 The Cryptographers&rsquo; Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512153 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511966 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511967 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications &ndash; SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511678 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511961 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511983 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512000 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511663 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:509919 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509743 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510427 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510418 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510552 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510309 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2005 The Cryptographers&rsquo; Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509752 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510543 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510411 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510415 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510063 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510199 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Complexity Theory and Cryptology An Introduction to Cryptocomplexity ent://SD_ILS/0/SD_ILS:509448 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Rothe, J&ouml;rg. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509738 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510189 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509717 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Advanced Encryption Standard &ndash; AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:510223 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Dobbertin, Hans. editor.<br/><a href="http://dx.doi.org/10.1007/b137765">http://dx.doi.org/10.1007/b137765</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510087 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510443 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510554 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510121 2024-06-25T13:42:35Z 2024-06-25T13:42:35Z by&#160;Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/>