Search Results for - Narrowed by: Management of Computing and Information Systems. - Cryptology. - TEDU library SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026ps$003d300? 2024-05-27T22:50:48Z Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428546 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221828 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222850 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222594 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222808 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225377 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225302 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224259 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21&ndash;23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226900 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Yan, Zheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225656 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 &ndash; December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226619 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIV 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221738 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Anderson, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62033-6">https://doi.org/10.1007/978-3-319-62033-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:225408 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225795 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225140 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:221571 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223564 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225946 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225278 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:224897 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226913 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Gro&szlig;mann, J&uuml;rgen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221654 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226881 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:226147 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221327 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7&ndash;9, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222560 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:223803 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223844 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Choi, Dooho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56549-1">https://doi.org/10.1007/978-3-319-56549-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224543 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222093 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221354 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2016 19th International Conference, Seoul, South Korea, November 30 &ndash; December 2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221296 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-05-27T22:50:48Z 2024-05-27T22:50:48Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/>