Your search returned 74 results.

Sort
Results
21.
Software Security - Theories and Systems [electronic resource] : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / by Series: Lecture Notes in Computer Science ; 3233
Edition: 1st ed. 2004.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004 In: Springer Nature eBook
Availability: No items available.

22.
Theory of Cryptography [electronic resource] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II / by Series: Security and Cryptology ; 9563
Edition: 1st ed. 2016.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016 In: Springer Nature eBook
Availability: No items available.

23.
Applied Cryptography and Network Security [electronic resource] : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / by Series: Security and Cryptology ; 8479
Edition: 1st ed. 2014.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014 In: Springer Nature eBook
Availability: No items available.

24.
Advances in Cryptology -- ASIACRYPT 2014 [electronic resource] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II / by Series: Security and Cryptology ; 8874
Edition: 1st ed. 2014.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014 In: Springer Nature eBook
Availability: No items available.

25.
Trusted Systems [electronic resource] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / by Series: Security and Cryptology ; 6163
Edition: 1st ed. 2010.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010 In: Springer Nature eBook
Availability: No items available.

26.
Theory of Cryptography [electronic resource] : 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings / by Series: Security and Cryptology ; 8349
Edition: 1st ed. 2014.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014 In: Springer Nature eBook
Availability: No items available.

27.
Progress in Cryptology – AFRICACRYPT 2016 [electronic resource] : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings / by Series: Security and Cryptology ; 9646
Edition: 1st ed. 2016.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016 In: Springer Nature eBook
Availability: No items available.

28.
Applied Cryptography and Network Security [electronic resource] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / by Series: Security and Cryptology ; 9092
Edition: 1st ed. 2015.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015 In: Springer Nature eBook
Availability: No items available.

29.
Advances in Cryptology – ASIACRYPT 2016 [electronic resource] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II / by Series: Security and Cryptology ; 10032
Edition: 1st ed. 2016.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016 In: Springer Nature eBook
Availability: No items available.

30.
Provable Security [electronic resource] : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings / by Series: Security and Cryptology ; 5324
Edition: 1st ed. 2008.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008 In: Springer Nature eBook
Availability: No items available.

31.
Information Security and Cryptology - ICISC 2009 [electronic resource] : 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers / by Series: Security and Cryptology ; 5984
Edition: 1st ed. 2010.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010 In: Springer Nature eBook
Availability: No items available.

32.
Theory of Cryptography [electronic resource] : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings / by Series: Security and Cryptology ; 7785
Edition: 1st ed. 2013.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 In: Springer Nature eBook
Availability: No items available.

33.
Mathematical Methods in Computer Science [electronic resource] : Essays in Memory of Thomas Beth / by Series: Theoretical Computer Science and General Issues ; 5393
Edition: 1st ed. 2008.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008 In: Springer Nature eBook
Availability: No items available.

34.
Sequences, Subsequences, and Consequences [electronic resource] : International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers / by Series: Security and Cryptology ; 4893
Edition: 1st ed. 2007.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007 In: Springer Nature eBook
Availability: No items available.

35.
Critical Information Infrastructures Security [electronic resource] : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers / by Series: Security and Cryptology ; 6027
Edition: 1st ed. 2010.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010 In: Springer Nature eBook
Availability: No items available.

36.
Cryptography and Coding [electronic resource] : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings / by Series: Security and Cryptology ; 3796
Edition: 1st ed. 2005.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005 In: Springer Nature eBook
Availability: No items available.

37.
Advances in Cryptology – ASIACRYPT 2016 [electronic resource] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I / by Series: Security and Cryptology ; 10031
Edition: 1st ed. 2016.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016 In: Springer Nature eBook
Availability: No items available.

38.
39.
Transactions on Data Hiding and Multimedia Security II [electronic resource] / by Series: Transactions on Data Hiding and Multimedia Security ; 4499
Edition: 1st ed. 2007.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007 In: Springer Nature eBook
Availability: No items available.

40.
Advances in Cryptology -- ASIACRYPT 2014 [electronic resource] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I / by Series: Security and Cryptology ; 8873
Edition: 1st ed. 2014.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014 In: Springer Nature eBook
Availability: No items available.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in