Search Results for - Narrowed by: Computer Communication Networks. - Coding and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-05-24T23:36:52Z IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20&ndash;22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084161 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format:&#160;Electronic Resources<br/> Space Information Networks Second International Conference, SINC 2017, Yinchuan, China, August 10-11, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084287 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Yu, Quan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7877-4">https://doi.org/10.1007/978-981-10-7877-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:2084248 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Wireless and Satellite Systems 9th International Conference, WiSATS 2017, Oxford, UK, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084116 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76571-6">https://doi.org/10.1007/978-3-319-76571-6</a><br/>Format:&#160;Electronic Resources<br/> Communications and Networking 12th International Conference, ChinaCom 2017, Xi&rsquo;an, China, October 10-12, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2084480 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Li, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78139-6">https://doi.org/10.1007/978-3-319-78139-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086040 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile Web and Intelligent Information Systems 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085497 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97163-6">https://doi.org/10.1007/978-3-319-97163-6</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085370 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Systems Digital Design, Fundamentals of Computer Architecture and Assembly Language ent://SD_ILS/0/SD_ILS:2087209 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Elahi, Ata. author.<br/><a href="https://doi.org/10.1007/978-3-319-66775-1">https://doi.org/10.1007/978-3-319-66775-1</a><br/>Format:&#160;Electronic Resources<br/> Communications and Networking 12th International Conference, ChinaCom 2017, Xi&rsquo;an, China, October 10-12, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2084807 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Li, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78130-3">https://doi.org/10.1007/978-3-319-78130-3</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085848 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Communication Technologies for Vehicles 13th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2018, Madrid, Spain, May 17-18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085644 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Moreno Garc&iacute;a-Loygorri, Juan. editor. (orcid)0000-0002-4626-1535<br/><a href="https://doi.org/10.1007/978-3-319-90371-2">https://doi.org/10.1007/978-3-319-90371-2</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085551 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/> Autonomous Control for a Reliable Internet of Services Methods, Models, Approaches, Techniques, Algorithms, and Tools ent://SD_ILS/0/SD_ILS:2085782 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Ganchev, Ivan. editor. (orcid)0000-0003-0535-7087<br/><a href="https://doi.org/10.1007/978-3-319-90415-3">https://doi.org/10.1007/978-3-319-90415-3</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Game Theory 11th International Symposium, SAGT 2018, Beijing, China, September 11-14, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085348 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Deng, Xiaotie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99660-8">https://doi.org/10.1007/978-3-319-99660-8</a><br/>Format:&#160;Electronic Resources<br/> Cognitive Radio Oriented Wireless Networks 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084804 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Marques, Paulo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76207-4">https://doi.org/10.1007/978-3-319-76207-4</a><br/>Format:&#160;Electronic Resources<br/> Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084644 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Fahrnberger, G&uuml;nter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085045 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085790 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086017 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format:&#160;Electronic Resources<br/> Economics of Grids, Clouds, Systems, and Services 12th International Conference, GECON 2015, Cluj-Napoca, Romania, September 15-17, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085560 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Altmann, J&ouml;rn. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43177-2">https://doi.org/10.1007/978-3-319-43177-2</a><br/>Format:&#160;Electronic Resources<br/> Network Coding at Different Layers in Wireless Networks ent://SD_ILS/0/SD_ILS:2086944 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Qin, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29770-5">https://doi.org/10.1007/978-3-319-29770-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085921 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085647 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Duquesne, Sylvain. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503576 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:501957 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format:&#160;Electronic Resources<br/> Analysis of Computer and Communication Networks ent://SD_ILS/0/SD_ILS:501788 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Gebali, Fayez. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74437-7">http://dx.doi.org/10.1007/978-0-387-74437-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503791 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Precoding Techniques for Digital Communication Systems ent://SD_ILS/0/SD_ILS:501680 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Kuo, C.-C. Jay. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71769-2">http://dx.doi.org/10.1007/978-0-387-71769-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:501584 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:505571 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:505628 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:505612 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:513037 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513023 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:504953 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:504461 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:504916 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:505285 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:504963 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format:&#160;Electronic Resources<br/> Orthogonal Frequency Division Multiplexing for Wireless Communications ent://SD_ILS/0/SD_ILS:504978 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Li, Ye. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30235-2">http://dx.doi.org/10.1007/0-387-30235-2</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:504837 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Baig&egrave;neres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511288 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Ytrehus, &Oslash;yvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/> The Multimedia Internet ent://SD_ILS/0/SD_ILS:504669 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Weinstein, Stephen. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27603-3">http://dx.doi.org/10.1007/0-387-27603-3</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510644 2024-05-24T23:36:52Z 2024-05-24T23:36:52Z by&#160;Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>