Search Results for - Narrowed by: Computer science. - Coding and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026ps$003d300?2024-06-07T20:23:20ZService-Oriented Computing – ICSOC 2017 Workshops ASOCA, ISyCC, WESOACS, and Satellite Events, Málaga, Spain, November 13–16, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852872024-06-07T20:23:20Z2024-06-07T20:23:20Zby Braubach, Lars. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91764-1">https://doi.org/10.1007/978-3-319-91764-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-06-07T20:23:20Z2024-06-07T20:23:20Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:20867692024-06-07T20:23:20Z2024-06-07T20:23:20Zby Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482024-06-07T20:23:20Z2024-06-07T20:23:20Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855812024-06-07T20:23:20Z2024-06-07T20:23:20Zby Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20855912024-06-07T20:23:20Z2024-06-07T20:23:20Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855922024-06-07T20:23:20Z2024-06-07T20:23:20Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855932024-06-07T20:23:20Z2024-06-07T20:23:20Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Electronic Participation 10th IFIP WG 8.5 International Conference, ePart 2018, Krems, Austria, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853282024-06-07T20:23:20Z2024-06-07T20:23:20Zby Edelmann, Noella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98578-7">https://doi.org/10.1007/978-3-319-98578-7</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852642024-06-07T20:23:20Z2024-06-07T20:23:20Zby Kő, Andrea. editor. (orcid)0000-0003-0023-1143<br/><a href="https://doi.org/10.1007/978-3-319-98349-3">https://doi.org/10.1007/978-3-319-98349-3</a><br/>Format: Electronic Resources<br/>Electronic Government 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852672024-06-07T20:23:20Z2024-06-07T20:23:20Zby Parycek, Peter. editor. (orcid)0000-0003-3242-0475<br/><a href="https://doi.org/10.1007/978-3-319-98690-6">https://doi.org/10.1007/978-3-319-98690-6</a><br/>Format: Electronic Resources<br/>DNA Computing and Molecular Programming 24th International Conference, DNA 24, Jinan, China, October 8–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853722024-06-07T20:23:20Z2024-06-07T20:23:20Zby Doty, David. editor. (orcid)0000-0002-3922-172X<br/><a href="https://doi.org/10.1007/978-3-030-00030-1">https://doi.org/10.1007/978-3-030-00030-1</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854972024-06-07T20:23:20Z2024-06-07T20:23:20Zby Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97163-6">https://doi.org/10.1007/978-3-319-97163-6</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:20848522024-06-07T20:23:20Z2024-06-07T20:23:20Zby Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856302024-06-07T20:23:20Z2024-06-07T20:23:20Zby Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542024-06-07T20:23:20Z2024-06-07T20:23:20Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithmsent://SD_ILS/0/SD_ILS:20840602024-06-07T20:23:20Z2024-06-07T20:23:20Zby Dooley, John F. author.<br/><a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format: Electronic Resources<br/>IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841612024-06-07T20:23:20Z2024-06-07T20:23:20Zby Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-06-07T20:23:20Z2024-06-07T20:23:20Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-06-07T20:23:20Z2024-06-07T20:23:20Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Computer Systems Digital Design, Fundamentals of Computer Architecture and Assembly Languageent://SD_ILS/0/SD_ILS:20872092024-06-07T20:23:20Z2024-06-07T20:23:20Zby Elahi, Ata. author.<br/><a href="https://doi.org/10.1007/978-3-319-66775-1">https://doi.org/10.1007/978-3-319-66775-1</a><br/>Format: Electronic Resources<br/>Electronic Government 15th IFIP WG 8.5 International Conference, EGOV 2016, Guimarães, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850982024-06-07T20:23:20Z2024-06-07T20:23:20Zby Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44421-5">https://doi.org/10.1007/978-3-319-44421-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-06-07T20:23:20Z2024-06-07T20:23:20Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Quantum Zero-Error Information Theoryent://SD_ILS/0/SD_ILS:20845772024-06-07T20:23:20Z2024-06-07T20:23:20Zby B. Guedes, Elloá. author.<br/><a href="https://doi.org/10.1007/978-3-319-42794-2">https://doi.org/10.1007/978-3-319-42794-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-06-07T20:23:20Z2024-06-07T20:23:20Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-06-07T20:23:20Z2024-06-07T20:23:20Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-06-07T20:23:20Z2024-06-07T20:23:20Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-06-07T20:23:20Z2024-06-07T20:23:20Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038032024-06-07T20:23:20Z2024-06-07T20:23:20Zby Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Electronic Resources<br/>Advances in Information Systems Research, Education and Practice IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015422024-06-07T20:23:20Z2024-06-07T20:23:20Zby Avison, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09682-7">http://dx.doi.org/10.1007/978-0-387-09682-7</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5019572024-06-07T20:23:20Z2024-06-07T20:23:20Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-06-07T20:23:20Z2024-06-07T20:23:20Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-06-07T20:23:20Z2024-06-07T20:23:20Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-06-07T20:23:20Z2024-06-07T20:23:20Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5028552024-06-07T20:23:20Z2024-06-07T20:23:20Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-06-07T20:23:20Z2024-06-07T20:23:20Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>A Concise Introduction to Software Engineeringent://SD_ILS/0/SD_ILS:5025412024-06-07T20:23:20Z2024-06-07T20:23:20Zby Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-302-6">http://dx.doi.org/10.1007/978-1-84800-302-6</a><br/>Format: Electronic Resources<br/>Advances in Applied Self-organizing Systemsent://SD_ILS/0/SD_ILS:5024482024-06-07T20:23:20Z2024-06-07T20:23:20Zby Prokopenko, Mikhail. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-982-8">http://dx.doi.org/10.1007/978-1-84628-982-8</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036662024-06-07T20:23:20Z2024-06-07T20:23:20Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format: Electronic Resources<br/>An Introduction to Kolmogorov Complexity and Its Applicationsent://SD_ILS/0/SD_ILS:5015962024-06-07T20:23:20Z2024-06-07T20:23:20Zby Li, Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49820-1">http://dx.doi.org/10.1007/978-0-387-49820-1</a><br/>Format: Electronic Resources<br/>Hypercomputation Computing Beyond the Church-Turing Barrierent://SD_ILS/0/SD_ILS:5016002024-06-07T20:23:20Z2024-06-07T20:23:20Zby Syropoulos, Apostolos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-49970-3">http://dx.doi.org/10.1007/978-0-387-49970-3</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027592024-06-07T20:23:20Z2024-06-07T20:23:20Zby Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-06-07T20:23:20Z2024-06-07T20:23:20Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-06-07T20:23:20Z2024-06-07T20:23:20Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037772024-06-07T20:23:20Z2024-06-07T20:23:20Zby Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Electronic Resources<br/>Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036882024-06-07T20:23:20Z2024-06-07T20:23:20Zby Barbero, Ángela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-06-07T20:23:20Z2024-06-07T20:23:20Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-06-07T20:23:20Z2024-06-07T20:23:20Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Computer Science Essays in Memory of Thomas Bethent://SD_ILS/0/SD_ILS:5038492024-06-07T20:23:20Z2024-06-07T20:23:20Zby Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5037912024-06-07T20:23:20Z2024-06-07T20:23:20Zby Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128142024-06-07T20:23:20Z2024-06-07T20:23:20Zby Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-06-07T20:23:20Z2024-06-07T20:23:20Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232024-06-07T20:23:20Z2024-06-07T20:23:20Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papersent://SD_ILS/0/SD_ILS:5130372024-06-07T20:23:20Z2024-06-07T20:23:20Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712024-06-07T20:23:20Z2024-06-07T20:23:20Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125902024-06-07T20:23:20Z2024-06-07T20:23:20Zby Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format: Electronic Resources<br/>Independent Component Analysis and Signal Separation 7th International Conference, ICA 2007, London, UK, September 9-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128012024-06-07T20:23:20Z2024-06-07T20:23:20Zby Davies, Mike E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74494-8">http://dx.doi.org/10.1007/978-3-540-74494-8</a><br/>Format: Electronic Resources<br/>Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128992024-06-07T20:23:20Z2024-06-07T20:23:20Zby Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format: Electronic Resources<br/>Variable-length Codes for Data Compressionent://SD_ILS/0/SD_ILS:5087172024-06-07T20:23:20Z2024-06-07T20:23:20Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format: Electronic Resources<br/>Asymmetry: The Foundation of Informationent://SD_ILS/0/SD_ILS:5122002024-06-07T20:23:20Z2024-06-07T20:23:20Zby Muller, Scott J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-06-07T20:23:20Z2024-06-07T20:23:20Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Information and Complexity in Statistical Modelingent://SD_ILS/0/SD_ILS:5058272024-06-07T20:23:20Z2024-06-07T20:23:20Zby Rissanen, Jorma. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68812-1">http://dx.doi.org/10.1007/978-0-387-68812-1</a><br/>Format: Electronic Resources<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:5118682024-06-07T20:23:20Z2024-06-07T20:23:20Zby Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130202024-06-07T20:23:20Z2024-06-07T20:23:20Zby Boztaş, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format: Electronic Resources<br/>String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129182024-06-07T20:23:20Z2024-06-07T20:23:20Zby Ziviani, Nivio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-06-07T20:23:20Z2024-06-07T20:23:20Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Data Compression The Complete Referenceent://SD_ILS/0/SD_ILS:5085982024-06-07T20:23:20Z2024-06-07T20:23:20Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142024-06-07T20:23:20Z2024-06-07T20:23:20Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-06-07T20:23:20Z2024-06-07T20:23:20Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-06-07T20:23:20Z2024-06-07T20:23:20Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-06-07T20:23:20Z2024-06-07T20:23:20Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-06-07T20:23:20Z2024-06-07T20:23:20Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-06-07T20:23:20Z2024-06-07T20:23:20Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-06-07T20:23:20Z2024-06-07T20:23:20Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5049632024-06-07T20:23:20Z2024-06-07T20:23:20Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-06-07T20:23:20Z2024-06-07T20:23:20Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications – SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116782024-06-07T20:23:20Z2024-06-07T20:23:20Zby Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-06-07T20:23:20Z2024-06-07T20:23:20Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Independent Component Analysis and Blind Signal Separation 6th International Conference, ICA 2006, Charleston, SC, USA, March 5-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107212024-06-07T20:23:20Z2024-06-07T20:23:20Zby Rosca, Justinian. editor.<br/><a href="http://dx.doi.org/10.1007/11679363">http://dx.doi.org/10.1007/11679363</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5113882024-06-07T20:23:20Z2024-06-07T20:23:20Zby Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-06-07T20:23:20Z2024-06-07T20:23:20Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-06-07T20:23:20Z2024-06-07T20:23:20Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117322024-06-07T20:23:20Z2024-06-07T20:23:20Zby Górski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117372024-06-07T20:23:20Z2024-06-07T20:23:20Zby Crestani, Fabio. editor.<br/><a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882024-06-07T20:23:20Z2024-06-07T20:23:20Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5099192024-06-07T20:23:20Z2024-06-07T20:23:20Zby Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-06-07T20:23:20Z2024-06-07T20:23:20Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-06-07T20:23:20Z2024-06-07T20:23:20Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-06-07T20:23:20Z2024-06-07T20:23:20Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>XML for Bioinformaticsent://SD_ILS/0/SD_ILS:5046392024-06-07T20:23:20Z2024-06-07T20:23:20Zby Cerami, Ethan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27478-2">http://dx.doi.org/10.1007/0-387-27478-2</a><br/>Format: Electronic Resources<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:5046002024-06-07T20:23:20Z2024-06-07T20:23:20Zby Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Universal Artificial Intellegence Sequential Decisions Based on Algorithmic Probabilityent://SD_ILS/0/SD_ILS:5090232024-06-07T20:23:20Z2024-06-07T20:23:20Zby Hutter, Marcus. author.<br/><a href="http://dx.doi.org/10.1007/b138233">http://dx.doi.org/10.1007/b138233</a><br/>Format: Electronic Resources<br/>Contemporary Cryptologyent://SD_ILS/0/SD_ILS:5130992024-06-07T20:23:20Z2024-06-07T20:23:20Zby Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Dependable Computing Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104522024-06-07T20:23:20Z2024-06-07T20:23:20Zby Maziero, Carlos Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/11572329">http://dx.doi.org/10.1007/11572329</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322024-06-07T20:23:20Z2024-06-07T20:23:20Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103662024-06-07T20:23:20Z2024-06-07T20:23:20Zby Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>List Decoding of Error-Correcting Codes Winning Thesis of the 2002 ACM Doctoral Dissertation Competitionent://SD_ILS/0/SD_ILS:5096752024-06-07T20:23:20Z2024-06-07T20:23:20Zby Guruswami, Venkatesan. author.<br/><a href="http://dx.doi.org/10.1007/b104335">http://dx.doi.org/10.1007/b104335</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101212024-06-07T20:23:20Z2024-06-07T20:23:20Zby Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5104112024-06-07T20:23:20Z2024-06-07T20:23:20Zby Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101352024-06-07T20:23:20Z2024-06-07T20:23:20Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Complexity Theory Exploring the Limits of Efficient Algorithmsent://SD_ILS/0/SD_ILS:5092402024-06-07T20:23:20Z2024-06-07T20:23:20Zby Wegener, Ingo. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27477-4">http://dx.doi.org/10.1007/3-540-27477-4</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106442024-06-07T20:23:20Z2024-06-07T20:23:20Zby Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-06-07T20:23:20Z2024-06-07T20:23:20Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Optical Communication Theory and Techniquesent://SD_ILS/0/SD_ILS:5041072024-06-07T20:23:20Z2024-06-07T20:23:20Zby Forestieri, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/b100765">http://dx.doi.org/10.1007/b100765</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-06-07T20:23:20Z2024-06-07T20:23:20Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Statistical and Inductive Inference by Minimum Message Lengthent://SD_ILS/0/SD_ILS:5046852024-06-07T20:23:20Z2024-06-07T20:23:20Zby Wallace, C.S. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27656-4">http://dx.doi.org/10.1007/0-387-27656-4</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-06-07T20:23:20Z2024-06-07T20:23:20Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792024-06-07T20:23:20Z2024-06-07T20:23:20Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>An Integrated Approach to Software Engineeringent://SD_ILS/0/SD_ILS:5047362024-06-07T20:23:20Z2024-06-07T20:23:20Zby Jalote, Pankaj. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28132-0">http://dx.doi.org/10.1007/0-387-28132-0</a><br/>Format: Electronic Resources<br/>