Search Results for Cryptography -- Congresses.SirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$002b--$002bCongresses.$0026ic$003dtrue$0026ps$003d300?dt=list2024-05-28T17:38:02ZQuantum information and computation X : 26-27 April 2012, Baltimore, Maryland, United Statesent://SD_ILS/0/SD_ILS:8007722024-05-28T17:38:02Z2024-05-28T17:38:02Zby Quantum information and computation (Conference) (10th : 2012 April : Baltimore, Maryland, US)<br/>Author Quantum information and computation (Conference) (10th : 2012 April : Baltimore, Maryland, US), Donkor, Eric, Pirich, Andrew R., Brandt, Howard E., SPIE (Society)<br/>Format: Books<br/>Call Number QA76.889 Q364 2012 f<br/>Publisher SPIE,<br/>Publication Date 2012 2011<br/>ISBN 9780819490780<br/>Quantum information and computation IX : 28-29 April 2011, Orlando, Florida, United Statesent://SD_ILS/0/SD_ILS:8007602024-05-28T17:38:02Z2024-05-28T17:38:02Zby Donkor, Eric<br/>Author Donkor, Eric, Pirich, Andrew R., Brandt, Howard E., SPIE (Society)<br/>Format: Books<br/>Call Number QA76.889 Q8483 2011 f<br/>Publisher SPIE,<br/>Publication Date 2011<br/>ISBN 9780819486318<br/>Cryptography, automata and learning theoryent://SD_ILS/0/SD_ILS:7568312024-05-28T17:38:02Z2024-05-28T17:38:02Zby Thomas, D. Gnanaraj<br/>Author Thomas, D. Gnanaraj, Jeyanthi, P. Abisha<br/>Format: Books<br/>Call Number QA268 C79 2010<br/>Publisher Narosa Pub. House,<br/>Publication Date 2011 2010<br/>ISBN 9788184870497<br/>Enhancing cryptographic primitives with techniques from error correcting codesent://SD_ILS/0/SD_ILS:8128082024-05-28T17:38:02Z2024-05-28T17:38:02Zby NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria)<br/>Author NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria), Preneel, Bart, 1963-, North Atlantic Treaty Organization. Public Diplomacy Division<br/>Format: Books<br/>Call Number QA76.9.A25 N384 2009<br/>Publisher IOS Press,<br/>Publication Date 2009<br/>ISBN 9781607500025<br/>Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedingsent://SD_ILS/0/SD_ILS:2259252024-05-28T17:38:02Z2024-05-28T17:38:02Zby CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)<br/>Author CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.), Menezes, A. J. (Alfred J.), 1965<br/>Format: Books<br/>Call Number QA76.9.A25 C795 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540741428<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">Fulltext</a><br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:6282362024-05-28T17:38:02Z2024-05-28T17:38:02Zby Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands)<br/>Author Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands), Vadhan, Salil P., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001382<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540709367<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Quantum information and computation V : 10-12 April 2007, Orlando, Florida, USAent://SD_ILS/0/SD_ILS:7288832024-05-28T17:38:02Z2024-05-28T17:38:02Zby Donkor, Eric<br/>Author Donkor, Eric, Pirich, Andrew R., Brandt, Howard E., Society of Photo-optical Instrumentation Engineers<br/>Format: Books<br/>Call Number QA76.889 Q364 2007 f<br/>Publisher SPIE,<br/>Publication Date 2007<br/>ISBN 9780819466952<br/>Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170602024-05-28T17:38:02Z2024-05-28T17:38:02Zby ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author ProvSec 2007 (2007 : Wollongong, N.S.W.), Susilo, Willy, Liu, Joseph K., Mu, Yi, 1955-, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000343<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175422024-05-28T17:38:02Z2024-05-28T17:38:02Zby ICISC 2007 (2007 : Seoul, Korea)<br/>Author ICISC 2007 (2007 : Seoul, Korea), Nam, Kil-Hyun, Rhee, Gwangsoo, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000184<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540767886 9783540767879<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175512024-05-28T17:38:02Z2024-05-28T17:38:02Zby International Conference on Cryptology and Network Security (6th : 2007 : Singapore)<br/>Author International Conference on Cryptology and Network Security (6th : 2007 : Singapore), Bao, Feng, Dr., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001165<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769699 9783540769682<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178812024-05-28T17:38:02Z2024-05-28T17:38:02Zby EUROCRYPT (2007 : Barcelona, Spain)<br/>Author EUROCRYPT (2007 : Barcelona, Spain), Naor, Moni, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000525<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540725404 9783540725398<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178852024-05-28T17:38:02Z2024-05-28T17:38:02Zby ACNS 2007 (2007 : Zhuhai, China)<br/>Author ACNS 2007 (2007 : Zhuhai, China), Katz, Jonathan, Yung, Moti, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001015<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540727385 9783540727378<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6256762024-05-28T17:38:02Z2024-05-28T17:38:02Zby International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan)<br/>Author International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan), Takagi, Tsuyoshi, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001281<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734895<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:6260652024-05-28T17:38:02Z2024-05-28T17:38:02Zby SAC 2006 (2006 : Montreal, Quebec)<br/>Author SAC 2006 (2006 : Montreal, Quebec), Biham, Eli, Youssef, Amr M., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001320<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540744627<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6263872024-05-28T17:38:02Z2024-05-28T17:38:02Zby CHES 2007 (2007 : Vienna, Austria)<br/>Author CHES 2007 (2007 : Vienna, Austria), Paillier, Pascal, Verbauwhede, Ingrid, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001338<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540747352<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in coding theory and crytographyent://SD_ILS/0/SD_ILS:2834422024-05-28T17:38:02Z2024-05-28T17:38:02Zby Shaska, Tanush<br/>Author Shaska, Tanush<br/>Format: Books<br/>Call Number QA268 A38 2007<br/>Publisher World Scientific,<br/>Publication Date 2007<br/>ISBN 9789812707017<br/>Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papersent://SD_ILS/0/SD_ILS:2829432024-05-28T17:38:02Z2024-05-28T17:38:02Zby Adams, Carlisle 1961-<br/>Author Adams, Carlisle 1961-, Miri, Ali, Wiener, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 S45 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540773597<br/>Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175482024-05-28T17:38:02Z2024-05-28T17:38:02Zby International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak)<br/>Author International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak), Kurosawa, Kaoru, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000526<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769002 9783540768999<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422302024-05-28T17:38:02Z2024-05-28T17:38:02Zby SCN 2006 (2006 : Maiori, Italy)<br/>Author SCN 2006 (2006 : Maiori, Italy), De Prisco, Roberto, 1968-, Yung, Moti<br/>Format: Books<br/>Call Number TK5105.59 S42 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540380801<br/>Applied public key infrastructure : 4th International Workshop : IWAP 2005ent://SD_ILS/0/SD_ILS:1748302024-05-28T17:38:02Z2024-05-28T17:38:02Zby International Workshop for Applied PKI (4th : 2005 : Singapore)<br/>Author International Workshop for Applied PKI (4th : 2005 : Singapore), Zhou, Jianying<br/>Format: Books<br/>Call Number QA76.9.A25 I577 2005<br/>Publisher IOS Press,<br/>Publication Date 2005<br/>ISBN 9781586035501<br/>Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysiaent://SD_ILS/0/SD_ILS:8458472024-05-28T17:38:02Z2024-05-28T17:38:02Zby International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia)<br/>Author International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia), Dawson, Ed (Edward) editor, Vaudenay, Serge, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I554 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540289388<br/>Restricted to SpringerLink subscribers
<a href=" http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html"> http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html</a>
<a href=" http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html"> http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html</a><br/>Design of an elliptic curve cryptography (ECC) processor core for implementation in FPGA-based System-On-Chip (SOC) Cryptosystement://SD_ILS/0/SD_ILS:3655032024-05-28T17:38:02Z2024-05-28T17:38:02Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Lim, Kie Woon, Malaysian Science and Technology Congress (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number TK7895.G36 M53 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papersent://SD_ILS/0/SD_ILS:3971822024-05-28T17:38:02Z2024-05-28T17:38:02Zby International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands), Blaze, Matt<br/>Format: Books<br/>Call Number HG1710 F56 2003<br/>Publisher Springer-Verlag,<br/>Publication Date 2003<br/>ISBN 9783540006466<br/>Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedingsent://SD_ILS/0/SD_ILS:3964772024-05-28T17:38:02Z2024-05-28T17:38:02Zby EUROCRYPT (2002 : Amsterdam, Netherlands)<br/>Author EUROCRYPT (2002 : Amsterdam, Netherlands), Knudsen, Lars<br/>Format: Books<br/>Call Number QA76.9.A25 E87 2002<br/>Publisher Springer-Verlag,<br/>Publication Date 2002<br/>ISBN 9783540435532<br/>Cryptology and computational number theoryent://SD_ILS/0/SD_ILS:2715352024-05-28T17:38:02Z2024-05-28T17:38:02Zby Pomerance, Carl<br/>Author Pomerance, Carl, Goldwasser, S.<br/>Format: Books<br/>Call Number QA76.9.A25 C79 1990<br/>Publisher American Mathematical Society,<br/>Publication Date 1990<br/>ISBN 9780821801550<br/>An application of the chinese remainder theorem to multiple-key encryption in database systemsent://SD_ILS/0/SD_ILS:3965352024-05-28T17:38:02Z2024-05-28T17:38:02Zby Cooper, R. H.<br/>Author Cooper, R. H., Hyslop, William, Patterson, Wayne<br/>Format: Books<br/>Call Number MAK 15911<br/>Publication Date 1984<br/>Client/server image protection system using hybrid security approach : steganography & cryptographyent://SD_ILS/0/SD_ILS:1689182024-05-28T17:38:02Z2024-05-28T17:38:02Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number belum proses<br/>Stream ciphers for high speed data transmissionent://SD_ILS/0/SD_ILS:4042532024-05-28T17:38:02Z2024-05-28T17:38:02Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat, Ahmad Zuri Sha'ameri, Malaysian Science and Technology Congress (1994 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 12011 a<br/>