Search Results for System theory. - Narrowed by: Data Encryption.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSystem$002btheory.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2024-07-28T15:40:26ZInformation Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:218462024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247802024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227062024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246322024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:247752024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226922024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:214462024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210272024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:240842024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244452024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248572024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235762024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:247722024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:205572024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:204482024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226262024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:239752024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:243902024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedingsent://SD_ILS/0/SD_ILS:241052024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247432024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247442024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225922024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:206432024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220052024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244262024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240222024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183592024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225302024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247792024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244372024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:205632024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:218842024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186622024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186632024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:228452024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:219592024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240442024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-07-28T15:40:26Z2024-07-28T15:40:26ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>