Search Results for - Narrowed by: Computer science. - Coding and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-06-07T20:23:20Z Service-Oriented Computing &ndash; ICSOC 2017 Workshops ASOCA, ISyCC, WESOACS, and Satellite Events, M&aacute;laga, Spain, November 13&ndash;16, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085287 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Braubach, Lars. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91764-1">https://doi.org/10.1007/978-3-319-91764-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086040 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:2086769 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:2084248 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085581 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085591 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085592 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085593 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Participation 10th IFIP WG 8.5 International Conference, ePart 2018, Krems, Austria, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085328 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Edelmann, Noella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98578-7">https://doi.org/10.1007/978-3-319-98578-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3&ndash;5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085264 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Kő, Andrea. editor. (orcid)0000-0003-0023-1143<br/><a href="https://doi.org/10.1007/978-3-319-98349-3">https://doi.org/10.1007/978-3-319-98349-3</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085267 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Parycek, Peter. editor. (orcid)0000-0003-3242-0475<br/><a href="https://doi.org/10.1007/978-3-319-98690-6">https://doi.org/10.1007/978-3-319-98690-6</a><br/>Format:&#160;Electronic Resources<br/> DNA Computing and Molecular Programming 24th International Conference, DNA 24, Jinan, China, October 8&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085372 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Doty, David. editor. (orcid)0000-0002-3922-172X<br/><a href="https://doi.org/10.1007/978-3-030-00030-1">https://doi.org/10.1007/978-3-030-00030-1</a><br/>Format:&#160;Electronic Resources<br/> Mobile Web and Intelligent Information Systems 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085497 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97163-6">https://doi.org/10.1007/978-3-319-97163-6</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:2084852 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085630 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085854 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:2084060 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Dooley, John F. author.<br/><a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/> IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20&ndash;22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084161 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085848 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Systems Digital Design, Fundamentals of Computer Architecture and Assembly Language ent://SD_ILS/0/SD_ILS:2087209 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Elahi, Ata. author.<br/><a href="https://doi.org/10.1007/978-3-319-66775-1">https://doi.org/10.1007/978-3-319-66775-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 15th IFIP WG 8.5 International Conference, EGOV 2016, Guimar&atilde;es, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085098 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44421-5">https://doi.org/10.1007/978-3-319-44421-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085709 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Quantum Zero-Error Information Theory ent://SD_ILS/0/SD_ILS:2084577 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;B. Guedes, Ello&aacute;. author.<br/><a href="https://doi.org/10.1007/978-3-319-42794-2">https://doi.org/10.1007/978-3-319-42794-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085800 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084644 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Fahrnberger, G&uuml;nter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086059 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503803 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Systems Research, Education and Practice IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501542 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Avison, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09682-7">http://dx.doi.org/10.1007/978-0-387-09682-7</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:501957 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:501584 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:502855 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> A Concise Introduction to Software Engineering ent://SD_ILS/0/SD_ILS:502541 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-302-6">http://dx.doi.org/10.1007/978-1-84800-302-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Applied Self-organizing Systems ent://SD_ILS/0/SD_ILS:502448 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Prokopenko, Mikhail. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-982-8">http://dx.doi.org/10.1007/978-1-84628-982-8</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503666 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to Kolmogorov Complexity and Its Applications ent://SD_ILS/0/SD_ILS:501596 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Li, Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49820-1">http://dx.doi.org/10.1007/978-0-387-49820-1</a><br/>Format:&#160;Electronic Resources<br/> Hypercomputation Computing Beyond the Church-Turing Barrier ent://SD_ILS/0/SD_ILS:501600 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Syropoulos, Apostolos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49970-3">http://dx.doi.org/10.1007/978-0-387-49970-3</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502759 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503576 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:503859 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503777 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/> Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503688 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Barbero, &Aacute;ngela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Methods in Computer Science Essays in Memory of Thomas Beth ent://SD_ILS/0/SD_ILS:503849 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format:&#160;Electronic Resources<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503791 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512814 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:511946 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513023 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:513037 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512871 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512590 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format:&#160;Electronic Resources<br/> Independent Component Analysis and Signal Separation 7th International Conference, ICA 2007, London, UK, September 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512801 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Davies, Mike E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74494-8">http://dx.doi.org/10.1007/978-3-540-74494-8</a><br/>Format:&#160;Electronic Resources<br/> Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512899 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format:&#160;Electronic Resources<br/> Variable-length Codes for Data Compression ent://SD_ILS/0/SD_ILS:508717 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format:&#160;Electronic Resources<br/> Asymmetry: The Foundation of Information ent://SD_ILS/0/SD_ILS:512200 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Muller, Scott J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:505628 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Complexity in Statistical Modeling ent://SD_ILS/0/SD_ILS:505827 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Rissanen, Jorma. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68812-1">http://dx.doi.org/10.1007/978-0-387-68812-1</a><br/>Format:&#160;Electronic Resources<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:511868 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513020 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Boztaş, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format:&#160;Electronic Resources<br/> String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512918 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Ziviani, Nivio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:508598 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:505571 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:505612 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:504916 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:504953 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:504837 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Baig&egrave;neres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Multimedia ent://SD_ILS/0/SD_ILS:504963 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format:&#160;Electronic Resources<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:505464 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications &ndash; SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511678 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Independent Component Analysis and Blind Signal Separation 6th International Conference, ICA 2006, Charleston, SC, USA, March 5-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510721 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Rosca, Justinian. editor.<br/><a href="http://dx.doi.org/10.1007/11679363">http://dx.doi.org/10.1007/11679363</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511388 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Aspects of the Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:505451 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511732 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;G&oacute;rski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/> String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511737 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Crestani, Fabio. editor.<br/><a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511288 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Ytrehus, &Oslash;yvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:509919 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format:&#160;Electronic Resources<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:505285 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:504461 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> XML for Bioinformatics ent://SD_ILS/0/SD_ILS:504639 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Cerami, Ethan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27478-2">http://dx.doi.org/10.1007/0-387-27478-2</a><br/>Format:&#160;Electronic Resources<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:504600 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/> Universal Artificial Intellegence Sequential Decisions Based on Algorithmic Probability ent://SD_ILS/0/SD_ILS:509023 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Hutter, Marcus. author.<br/><a href="http://dx.doi.org/10.1007/b138233">http://dx.doi.org/10.1007/b138233</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptology ent://SD_ILS/0/SD_ILS:513099 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/> Dependable Computing Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510452 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Maziero, Carlos Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/11572329">http://dx.doi.org/10.1007/11572329</a><br/>Format:&#160;Electronic Resources<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:508732 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510366 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/> List Decoding of Error-Correcting Codes Winning Thesis of the 2002 ACM Doctoral Dissertation Competition ent://SD_ILS/0/SD_ILS:509675 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Guruswami, Venkatesan. author.<br/><a href="http://dx.doi.org/10.1007/b104335">http://dx.doi.org/10.1007/b104335</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510121 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510411 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Complexity Theory Exploring the Limits of Efficient Algorithms ent://SD_ILS/0/SD_ILS:509240 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Wegener, Ingo. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27477-4">http://dx.doi.org/10.1007/3-540-27477-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510644 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> Optical Communication Theory and Techniques ent://SD_ILS/0/SD_ILS:504107 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Forestieri, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/b100765">http://dx.doi.org/10.1007/b100765</a><br/>Format:&#160;Electronic Resources<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:504226 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/> Statistical and Inductive Inference by Minimum Message Length ent://SD_ILS/0/SD_ILS:504685 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Wallace, C.S. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27656-4">http://dx.doi.org/10.1007/0-387-27656-4</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:504179 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> An Integrated Approach to Software Engineering ent://SD_ILS/0/SD_ILS:504736 2024-06-07T20:23:20Z 2024-06-07T20:23:20Z by&#160;Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28132-0">http://dx.doi.org/10.1007/0-387-28132-0</a><br/>Format:&#160;Electronic Resources<br/>