Search Results for - Narrowed by: Computer security. - Algorithms. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Algorithms.$002509Algorithms.$0026ps$003d300? 2024-05-19T17:32:42Z Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:428206 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format:&#160;Electronic Resources<br/> PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428505 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570<br/><a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Image Processing 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428284 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30508-6">https://doi.org/10.1007/978-3-030-30508-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428821 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20518-8">https://doi.org/10.1007/978-3-030-20518-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428822 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20521-8">https://doi.org/10.1007/978-3-030-20521-8</a><br/>Format:&#160;Electronic Resources<br/> Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, Le&oacute;n, Spain, September 4&ndash;6, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428262 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;P&eacute;rez Garc&iacute;a, Hilde. editor. (orcid)0000-0001-7112-1983<br/><a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:429109 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:429110 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10&ndash;12, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428734 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dama&scaron;evičius, Robertas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428564 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:429101 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format:&#160;Electronic Resources<br/> High-Performance Computing and Big Data Analysis Second International Congress, TopHPC 2019, Tehran, Iran, April 23&ndash;25, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429254 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Grandinetti, Lucio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33495-6">https://doi.org/10.1007/978-3-030-33495-6</a><br/>Format:&#160;Electronic Resources<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:226961 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Geng, Wen-dong. author.<br/><a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17324 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18073 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18119 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Cheng, Long. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40663-3">http://dx.doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18292 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Schiffner, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44760-5">http://dx.doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18345 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:18679 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18680 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:18635 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18342 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18344 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18617 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18618 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18638 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18639 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17206 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28034-9">http://dx.doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17353 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17433 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18085 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18236 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18678 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17368 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18375 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Kordy, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46263-9">http://dx.doi.org/10.1007/978-3-319-46263-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18413 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18663 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19185 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17694 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17941 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17623 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18360 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Li, Wenfeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45940-0">http://dx.doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17636 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31456-3">http://dx.doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18662 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:17618 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17560 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:22845 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23400 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23143 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24779 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24780 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23540 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24850 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24885 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22592 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23280 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format:&#160;Electronic Resources<br/> Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23192 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23554 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23571 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23508 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23520 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23337 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:23342 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23343 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23530 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23004 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23213 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23576 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24735 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24743 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24744 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22310 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22540 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23468 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23580 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24848 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21756 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24390 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 &ndash; October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21782 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Felber, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11764-5">http://dx.doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:24552 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Aumasson, Jean-Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44757-4">http://dx.doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24492 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24493 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24022 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21959 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21620 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Teufel, Stephanie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10975-6">http://dx.doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:22004 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22005 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:23975 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24105 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:24044 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22047 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24688 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Interactive Theorem Proving 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21267 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Klein, Gerwin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08970-6">http://dx.doi.org/10.1007/978-3-319-08970-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:23900 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Chatterjee, Mainak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45249-9">http://dx.doi.org/10.1007/978-3-642-45249-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20482 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04483-5">http://dx.doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21764 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Fortino, Giancarlo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11692-1">http://dx.doi.org/10.1007/978-3-319-11692-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21846 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21922 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-05-19T17:32:42Z 2024-05-19T17:32:42Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>