Search Results for - Narrowed by: Springer E-Book Collection - Coding and Information Theory. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-05-15T10:07:02ZE-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280022024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format: Electronic Resources<br/>Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282162024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2019 Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276902024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Joshi, James. editor. (orcid)0000-0003-4519-9802<br/><a href="https://doi.org/10.1007/978-3-030-23404-1">https://doi.org/10.1007/978-3-030-23404-1</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281792024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890<br/><a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283062024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4284002024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288252024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format: Electronic Resources<br/>Advances in Cyber Security: Principles, Techniques, and Applicationsent://SD_ILS/0/SD_ILS:4283982024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290992024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289792024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287602024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Polian, Ilia. editor. (orcid)0000-0002-6563-2725<br/><a href="https://doi.org/10.1007/978-3-030-16350-1">https://doi.org/10.1007/978-3-030-16350-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>ICT Unbounded, Social Impact of Bright ICT Adoption IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4292512024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Dwivedi, Yogesh. editor. (orcid)0000-0002-5547-9990<br/><a href="https://doi.org/10.1007/978-3-030-20671-0">https://doi.org/10.1007/978-3-030-20671-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287412024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Choffnes, David. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15986-3">https://doi.org/10.1007/978-3-030-15986-3</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2229062024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220232024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2214992024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:2218792024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267682024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Nah, Fiona Fui-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:2218292024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2245772024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:2234592024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Advances in User Authenticationent://SD_ILS/0/SD_ILS:2235742024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Dasgupta, Dipankar. author.<br/><a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261122024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shikata, Junji. editor. (orcid)0000-0003-2861-359X<br/><a href="https://doi.org/10.1007/978-3-319-72089-0">https://doi.org/10.1007/978-3-319-72089-0</a><br/>Format: Electronic Resources<br/>Electronic Government 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261562024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Janssen, Marijn. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64677-0">https://doi.org/10.1007/978-3-319-64677-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carletent://SD_ILS/0/SD_ILS:2222012024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213272024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253912024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2249942024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Kaafar, Mohamed Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54328-4">https://doi.org/10.1007/978-3-319-54328-4</a><br/>Format: Electronic Resources<br/>Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265952024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2257952024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2220842024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2244262024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format: Electronic Resources<br/>Digital Nations – Smart Cities, Innovation, and Sustainability 16th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2017, Delhi, India, November 21–23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221042024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Kar, Arpan Kumar. editor. (orcid)0000-0003-4186-4887<br/><a href="https://doi.org/10.1007/978-3-319-68557-1">https://doi.org/10.1007/978-3-319-68557-1</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Extraction First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2217502024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194<br/><a href="https://doi.org/10.1007/978-3-319-66808-6">https://doi.org/10.1007/978-3-319-66808-6</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2245122024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2262412024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format: Electronic Resources<br/>Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2264352024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2269352024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265872024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:228452024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248572024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:232932024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:247722024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:247752024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225922024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226922024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226262024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235762024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:202332024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240222024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:243902024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:205572024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244372024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244452024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:204482024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:213672024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220052024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:206432024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:240842024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:218462024-05-15T10:07:02Z2024-05-15T10:07:02ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>