Search Results for - Narrowed by: Computer software. - Computers and Society. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026ps$003d300$0026isd$003dtrue? 2024-06-23T20:39:34Z Algorithms and Architectures for Parallel Processing 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:2085402 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05063-4">https://doi.org/10.1007/978-3-030-05063-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085549 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085095 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085567 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085557 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086096 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:502699 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512248 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512660 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Data Engineering and Automated Learning - IDEAL 2007 8th International Conference, Birmingham, UK, December 16-19, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513021 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Yin, Hujun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77226-2">http://dx.doi.org/10.1007/978-3-540-77226-2</a><br/>Format:&#160;Electronic Resources<br/> Anticipatory Behavior in Adaptive Learning Systems From Brains to Individual and Social Behavior ent://SD_ILS/0/SD_ILS:512773 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Butz, Martin V. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74262-3">http://dx.doi.org/10.1007/978-3-540-74262-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:512594 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511967 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510749 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511663 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511244 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:512135 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security I ent://SD_ILS/0/SD_ILS:511937 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511983 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Data Engineering and Automated Learning &ndash; IDEAL 2006 7th International Conference, Burgos, Spain, September 20-23, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511725 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Corchado, Emilio. editor.<br/><a href="http://dx.doi.org/10.1007/11875581">http://dx.doi.org/10.1007/11875581</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511915 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511961 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Data Engineering and Automated Learning - IDEAL 2005 6th International Conference, Brisbane, Australia, July 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510141 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Gallagher, Marcus. editor.<br/><a href="http://dx.doi.org/10.1007/b137888">http://dx.doi.org/10.1007/b137888</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510189 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510063 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510415 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-06-23T20:39:34Z 2024-06-23T20:39:34Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/>