Search Results for - Narrowed by: Electronic Book - English - 2015 - Coding and Information Theory. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026qf$003dLANGUAGE$002509Dil$002509ENG$002509English$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dSUBJECT$002509Konu$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026ps$003d300$0026isd$003dtrue? 2024-07-03T07:37:10Z Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:22533 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23194 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22626 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:23293 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/> Scalable Information Systems 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22607 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Jung, Jason J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16868-5">http://dx.doi.org/10.1007/978-3-319-16868-5</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22530 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24735 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:22845 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22692 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22590 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22592 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23576 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22924 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:23488 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23496 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Signal Coding and Transmission ent://SD_ILS/0/SD_ILS:24770 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Ohm, Jens-Rainer. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46691-9">http://dx.doi.org/10.1007/978-3-662-46691-9</a><br/>Format:&#160;Electronic Resources<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:25962 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Kr&auml;mer, Juliane. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-787-1">http://dx.doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24772 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:24775 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing Application and Wireless Sensor UCAWSN-14 ent://SD_ILS/0/SD_ILS:25509 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9618-7">http://dx.doi.org/10.1007/978-94-017-9618-7</a><br/>Format:&#160;Electronic Resources<br/> Zhang Functions and Various Models ent://SD_ILS/0/SD_ILS:24821 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Zhang, Yunong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47334-4">http://dx.doi.org/10.1007/978-3-662-47334-4</a><br/>Format:&#160;Electronic Resources<br/> High Efficiency Video Coding Coding Tools and Specification ent://SD_ILS/0/SD_ILS:24482 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Wien, Mathias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44276-0">http://dx.doi.org/10.1007/978-3-662-44276-0</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24857 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24886 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24887 2024-07-03T07:37:10Z 2024-07-03T07:37:10Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/>