Search Results for - Narrowed by: 2019 - Cryptology. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092019$0025092019$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-06-12T23:38:20ZAdvances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4279132024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277382024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284222024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285372024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Advances in Cyber Security: Principles, Techniques, and Applicationsent://SD_ILS/0/SD_ILS:4283982024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284922024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331<br/><a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4290242024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290332024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284402024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Zohar, Aviv. editor.<br/><a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289462024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Mu, Yi. editor. (orcid)0000-0002-1637-845X<br/><a href="https://doi.org/10.1007/978-3-030-31578-8">https://doi.org/10.1007/978-3-030-31578-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4290402024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290412024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format: Electronic Resources<br/>Cryptology and Error Correction An Algebraic Introduction and Real-World Applicationsent://SD_ILS/0/SD_ILS:4282592024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Childs, Lindsay N. author.<br/><a href="https://doi.org/10.1007/978-3-030-15453-0">https://doi.org/10.1007/978-3-030-15453-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289792024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environmentsent://SD_ILS/0/SD_ILS:4289852024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16837-7">https://doi.org/10.1007/978-3-030-16837-7</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applicationsent://SD_ILS/0/SD_ILS:4277712024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Möller, Dietmar P.F. author.<br/><a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279232024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Cheng, Xiaohui. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4277782024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Ethical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:4283582024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289142024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406<br/><a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276912024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Renault, Éric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format: Electronic Resources<br/>Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276952024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183<br/><a href="https://doi.org/10.1007/978-3-030-31919-9">https://doi.org/10.1007/978-3-030-31919-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4278202024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4280242024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277582024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Fahrnberger, Günter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285002024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Matsui, Mitsuru. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285242024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Schwabe, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4289212024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4284902024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4286442024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286692024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Bilgin, Begül. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>Deep Reinforcement Learning Frontiers of Artificial Intelligenceent://SD_ILS/0/SD_ILS:4291002024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Sewak, Mohit. author.<br/><a href="https://doi.org/10.1007/978-981-13-8285-7">https://doi.org/10.1007/978-981-13-8285-7</a><br/>Format: Electronic Resources<br/>Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287662024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-30625-0">https://doi.org/10.1007/978-3-030-30625-0</a><br/>Format: Electronic Resources<br/>Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimationent://SD_ILS/0/SD_ILS:4287932024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Díaz Cardell, Sara. author.<br/><a href="https://doi.org/10.1007/978-3-030-12850-0">https://doi.org/10.1007/978-3-030-12850-0</a><br/>Format: Electronic Resources<br/>Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291962024-06-12T23:38:20Z2024-06-12T23:38:20ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240<br/><a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>