Search Results for Coding theory. - Narrowed by: Computer security. - Cryptology. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dCoding$002btheory.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ps$003d300? 2024-10-03T13:07:50Z Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226587 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:428398 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224512 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:427950 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223131 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:226241 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10&ndash;12, 2017, Proceedings - In Honor of Claude Carlet ent://SD_ILS/0/SD_ILS:222201 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225795 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226435 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:428979 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226595 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428778 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:221879 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225557 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225391 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222084 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429183 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221327 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224628 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222906 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223249 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224692 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;O'Neill, M&aacute;ire. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71045-7">https://doi.org/10.1007/978-3-319-71045-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:221562 2024-10-03T13:07:50Z 2024-10-03T13:07:50Z Yazar&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>