Search Results for - Narrowed by: Coding and Information Theory. - Computer science. - Data Structures, Cryptology and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300?2024-06-24T00:06:53ZFast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5028552024-06-24T00:06:53Z2024-06-24T00:06:53Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-06-24T00:06:53Z2024-06-24T00:06:53Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-06-24T00:06:53Z2024-06-24T00:06:53Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-06-24T00:06:53Z2024-06-24T00:06:53Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-06-24T00:06:53Z2024-06-24T00:06:53Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-06-24T00:06:53Z2024-06-24T00:06:53Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Computer Science Essays in Memory of Thomas Bethent://SD_ILS/0/SD_ILS:5038492024-06-24T00:06:53Z2024-06-24T00:06:53Zby Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-06-24T00:06:53Z2024-06-24T00:06:53Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-06-24T00:06:53Z2024-06-24T00:06:53Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-06-24T00:06:53Z2024-06-24T00:06:53Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-06-24T00:06:53Z2024-06-24T00:06:53Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-06-24T00:06:53Z2024-06-24T00:06:53Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142024-06-24T00:06:53Z2024-06-24T00:06:53Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-06-24T00:06:53Z2024-06-24T00:06:53Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-06-24T00:06:53Z2024-06-24T00:06:53Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-06-24T00:06:53Z2024-06-24T00:06:53Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-06-24T00:06:53Z2024-06-24T00:06:53Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-06-24T00:06:53Z2024-06-24T00:06:53Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-06-24T00:06:53Z2024-06-24T00:06:53Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-06-24T00:06:53Z2024-06-24T00:06:53Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-06-24T00:06:53Z2024-06-24T00:06:53Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-06-24T00:06:53Z2024-06-24T00:06:53Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322024-06-24T00:06:53Z2024-06-24T00:06:53Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Contemporary Cryptologyent://SD_ILS/0/SD_ILS:5130992024-06-24T00:06:53Z2024-06-24T00:06:53Zby Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-06-24T00:06:53Z2024-06-24T00:06:53Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-06-24T00:06:53Z2024-06-24T00:06:53Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-06-24T00:06:53Z2024-06-24T00:06:53Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792024-06-24T00:06:53Z2024-06-24T00:06:53Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>