Search Results for - Narrowed by: 2018 - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092018$0025092018$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-05-18T20:00:29ZMobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2236872024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217712024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2216922024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216272024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220482024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228112024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2245382024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252232024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256712024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2255092024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Unconventional Computation and Natural Computation 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260052024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Stepney, Susan. editor. (orcid)0000-0003-3146-5401<br/><a href="https://doi.org/10.1007/978-3-319-92435-9">https://doi.org/10.1007/978-3-319-92435-9</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260232024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260242024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261882024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2217842024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2220762024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220992024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223702024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223712024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2223932024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223282024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2214932024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:2215032024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2215302024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212392024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2216162024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216442024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216452024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219692024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2226332024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235162024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format: Electronic Resources<br/>Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2251762024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2213782024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format: Electronic Resources<br/>Fault Tolerant Architectures for Cryptography and Hardware Securityent://SD_ILS/0/SD_ILS:2234372024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228022024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Electronic Resources<br/>Random Numbers and Computersent://SD_ILS/0/SD_ILS:2228492024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228502024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2249002024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222772024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2226772024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:2218792024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218282024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2229062024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:2215622024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212822024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2218882024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2221892024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227172024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2225912024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267982024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2219892024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:2219902024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:2231012024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2228952024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228962024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228972024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225452024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2248012024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-05-18T20:00:29Z2024-05-18T20:00:29ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>