Sign in to My TN

Terkko Navigator / -/ Feeds / "data structures, cryptology and information theory"

  • Feeds
  • Journals
  • Books
  • Databases & Sites
  • Profiles
  • Privacy, security, and trust within the context of pervasive computing
    Computer security, Mobile computing, Ubiquitous computing, Computer Science, Data Encryption, Data Structures, Cryptology and Information Theory, Information Systems and Communication Service, Information Systems Applications (incl. Internet), Pattern Recognition, sähkökirjat
    Robinson, Philip;Wagealla, Waleed;Vogt, Harald
    Read
  • Security for telecommunications networks
    Telecommunication systems, TECHNOLOGY & ENGINEERING, Computer Science, Computer Systems Organization and Communication Networks, Data Encryption, Data Structures, Cryptology and Information Theory, Systems and Data Security, sähkökirjat
    Traynor, Patrick;La Porta, Thomas F;McDaniel, Patrick
    Read
  • Mathematical methods in computer science : essays in memory of Thomas Beth
    Computer arithmetic, Computer science, Coding and Information Theory, Computing Methodologies, Data Encryption, Data Structures, Cryptology and Information Theory, Mathematics of Computing, Quantum Physics, sähkökirjat
    Calmet, Jacques;Geiselmann, Willi;Müller-Quade, Jörn
    Read
  • Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings
    Computer security, Data encryption (Computer science), Embedded computer systems, Algorithm Analysis and Problem Complexity, Coding and Information Theory, Coding theory, Computational complexity, Computer science, Computer software, Data Encryption, Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Discrete Mathematics in Computer Science, Systems and Data Security, sähkökirjat
    Preneel, Bart;Takagi, Tsuyoshi
    Read
  • High performance networking, computing, and communication systems : Second International Conference, ICHCC 2011, Singapore, May 5-6, 2011 : selected papers
    High performance computing, Computation by Abstract Devices, Computational complexity, Computer Communication Networks, Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Discrete Mathematics in Computer Science, Information Storage and Retrieval, Information storage and retrieval systems, Information Systems Applications (incl. Internet), sähkökirjat
    Wu, Yanwen
    Read
  • Block cipher companion, The
    Cryptography, Data encryption (Computer science), Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Mathematics of Computing, sähkökirjat
    Knudsen, Lars;Robshaw, Matthew
    Read
  • Applied information security : a hands-on approach
    Computer networks, Computer security, Data encryption (Computer science), Data protection, Business Information Systems, Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information Systems, Innovation/Technology Management, Management information systems, Management of Computing and Information Systems, Systems and Data Security, sähkökirjat
    Basin, David;Schaller, Patrick;Schläpfer, Michael
    Read
  • Theoretical and mathematical foundations of computer science : second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, selected papers
    Computer science, Computer Communication Networks, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information systems, Mathematics of Computing, sähkökirjat
    Zhou, Qihai
    Read
  • Encyclopedia of cryptography and security
    Computer security, Data encryption (Computer science), Coding and Information Theory, Coding theory, Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, sähkökirjat
    Jajodia, Sushil;Tilborg, Henk C. A. van
    Read
  • Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings
    Computer networks, Computer security, Data encryption (Computer science), Algorithm Analysis and Problem Complexity, Coding and Information Theory, Coding theory, Computer Communication Networks, Computer science, Computer software, Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Systems and Data Security, sähkökirjat
    Qing, Sihan
    Read
  • Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings
    Computer security, Data encryption (Computer science), Algorithm Analysis and Problem Complexity, Coding and Information Theory, Coding theory, Computational complexity, Computer science, Computer software, Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Discrete Mathematics in Computer Science, Systems and Data Security, sähkökirjat
    Chen, Liqun
    Read
  • Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
    Computer networks, Data encryption (Computer science), Coding and Information Theory, Coding theory, Computational complexity, Computer Communication Networks, Computer science, Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Systems and Data Security, sähkökirjat
    Lin, Dongdai;Tsudik, G;Wang, Xiaoyun
    Read
  • Analysis of rare categories
    Data mining, Sampling (Statistics), Artificial intelligence, Computational Intelligence, Computer science, Data Mining and Knowledge Discovery, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Engineering, sähkökirjat
    He, Jingrui
    Read
  • Engineering secure software and systems : 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings
    Computer networks, Computer security, Data encryption (Computer science), Software engineering, Computer Communication Networks, Computer science, Data Encryption, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Math Applications in Computer Science, Models and Principles, Software Engineering/Programming and Operating Systems, sähkökirjat
    Barthe, Gilles;Livshits, Benjamin;Scandariato, Riccardo
    Read
  • E-Business and telecommunications : 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised selected papers
    Business, Computer networks, Electronic commerce, Telecommunication systems, Algorithm Analysis and Problem Complexity, Coding and Information Theory, Coding theory, Computer Communication Networks, Computer science, Computer software, Data structures (Computer science), Data Structures, Cryptology and Information Theory, e-Commerce/e-business, Multimedia Information Systems, Multimedia systems, sähkökirjat
    Filipe, Joaquim;Obaidat, Mohammad S;Tsihrintzis, George A
    Read
  • Survey of data leakage detection and prevention solutions, A
    Data protection, Database management, Database security, Computer science, Data Structures, Cryptology and Information Theory, Information Systems and Communication Service, Information systems, Systems and Data Security, sähkökirjat
    Shabtai, Asaf;Elovici, Yuval;Rokach, Lior
    Read
  • Applications of algebra to communications, control, and signal processing
    Algebra, Abstract, Computer science, Engineering mathematics, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Engineering, Signal, Image and Speech Processing, sähkökirjat
    Boston, Nigel
    Read
  • Information security technology for applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers
    Computer networks, Computer security, Coding and Information Theory, Coding theory, Computer science, Data encryption (Computer science), Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information Systems Applications (incl. Internet), Information Systems, Management of Computing and Information Systems, Systems and Data Security, sähkökirjat
    Laud, Peeter
    Read
  • Theory and applications of models of computation : 9th annual conference, TAMC 2012, Beijing, China, May 16-21, 2012 : proceedings
    Computational complexity, Computer science, Turing machines, Algorithm Analysis and Problem Complexity, Computer software, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information theory, Logic design, Logics and Meanings of Programs, Mathematical Logic and Formal Languages, Mathematics of Computing, Theory of Computation, sähkökirjat
    Agrawal, Manindra;Cooper, S. B;Li, Angsheng
    Read
  • Crittografia nel Paese delle Meraviglie
    Data encryption (Computer science), Applications of Mathematics, Computer science, Data protection, Data Structures, Cryptology and Information Theory, Mathematics, Systems and Data Security, sähkökirjat
    Venturi, Daniele
    Read
  • Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20
    Computer networks, Computer security, Data protection, Computer Communication Networks, Computer science, Data encryption (Computer science), Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information Systems, Management of Computing and Information Systems, Systems and Data Security, sähkökirjat
    Askoxylakis, Ioannis;Pöhls, Henrich C;Posegga, Joachim
    Read
  • Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
    Computer networks, Data encryption (Computer science), Data protection, Coding and Information Theory, Coding theory, Computer Communication Networks, Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Information Systems, Management of Computing and Information Systems, Systems and Data Security, sähkökirjat
    Mitrokotsa, Aikaterini;Vaudenay, Serge
    Read
  • Fault analysis in cryptography
    Data encryption (Computer science), Computer engineering, Computer hardware, Computer science, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Electrical Engineering, sähkökirjat
    Joye, Marc;Tunstall, Michael
    Read
  • Arithmetic of finite fields : 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings
    Algebraic fields, Algebra -- Data processing, Algorithm Analysis and Problem Complexity, Computational complexity, Computer Communication Networks, Computer science, Computer software, Data encryption (Computer science), Data structures (Computer science), Data Structures, Cryptology and Information Theory, Discrete Mathematics in Computer Science, Symbolic and Algebraic Manipulation, sähkökirjat
    Özbudak, Ferruh;Rodríguez-Henríquez, Francisco
    Read
  • Digital forensics and watermarking : 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised selected papers
    Data encryption (Computer science), Computer graphics, Computer science, Computer vision, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Image Processing and Computer Vision, Information storage and retrieval systems, Information Storage and Retrieval, sähkökirjat
    Kim, Hyoung Joong;Pérez-González, F;Shi, Yun Q
    Read
  • Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation
    Computer network protocols, Computer networks, Data encryption (Computer science), Communications Engineering, Networks, Computer network architectures, Computer science, Computer Systems Organization and Communication Networks, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Telecommunication, sähkökirjat
    Schneider, Thomas
    Read
  • Operational semantics and verification of security protocols
    Computer networks, Computer security, Semantic computing, Computer network architectures, Computer science, Computer Systems Organization and Communication Networks, Data Structures, Cryptology and Information Theory, Software engineering, Software Engineering/Programming and Operating Systems, sähkökirjat
    Cremers, Cas;Mauw, S
    Read
  • Network science and cybersecurity
    Computer networks, Computer security, Internet, Communications Engineering, Networks, Computer Communication Networks, Computer science, Data encryption (Computer science), Data protection, Data structures (Computer science), Data Structures, Cryptology and Information Theory, Systems and Data Security, Telecommunication, sähkökirjat
    Pino, Robinson E
    Read
  • Cryptography in constant parallel time
    Computer science, Data encryption (Computer science), Data structures (Computer science), Data Structures, Cryptology and Information Theory, Mathematics of Computing, sähkökirjat
    Applebaum, Benny
    Read
  • Biometrics in the new world : the cloud, mobile technology and pervasive identity
    Biometric identification, Computer Science, Biometrics, Computer Appl. in Social and Behavioral Sciences, Computers and Society, Data Structures, Cryptology and Information Theory, Software Engineering/Programming and Operating Systems, Special Purpose and Application-Based Systems, sähkökirjat
    Ashbourn, Julian
    Read
  • Trustworthy reconfigurable systems : enhancing the security capabilities of reconfigurable hardware architectures
    Adaptive computing systems, Computer security, Data encryption (Computer science), Computer Science, Computer Hardware, Data Structures, Cryptology and Information Theory, sähkökirjat
    Feller, Thomas
    Read
  • Authentication in insecure environments : using visual cryptography and non-transferable credentials in practise
    Computer networks, Data encryption (Computer science), Computer Science, Data Structures, Cryptology and Information Theory, Information Systems and Communication Service, sähkökirjat
    Pape, Sebastian
    Read
  • Medicine - All Feeds
  • Allergology and Immunology
  • Anatomy and Physiology
  • Anesthesiology and Intensive Care
  • Biochemistry
  • Bioengineering
  • Biophysics
  • Biotechnology
  • Cardiology
  • Cardiothoracic Surgery
  • Clinical Chemistry
  • Clinical Medicine
  • Complementary Medicine
  • Cytology and Histology
  • Dentistry
  • Dermatology
  • Endocrinology
  • Forensic Medicine
  • Gastroenterology
  • General Practice
  • Genetics
  • Geriatrics
  • Health services and Administration
  • Hematology
  • Infectious Diseases
  • Internal Medicine
  • Logopedics
  • Medical Education and Humanities
  • Medical Microbiology
  • Medicine - Other
  • Nephrology
  • Neurology
  • Neurosurgery
  • Nursing
  • Nutritional Sciences
  • Obstetrics and Gynecology
  • Occupational Health
  • Oncology
  • Ophthalmology
  • Oral and Maxillofacial Surgery
  • Orthopedics and Traumatology
  • Otorhinolaryngology and Phoniatrics
  • Pathology
  • Pediatrics
  • Pharmacology and Pharmacotherapy
  • Physical and Rehabilitation Medicine
  • Plastic Surgery
  • Psychiatry
  • Psychology
  • Public Health
  • Radiology
  • Respiratory Medicine
  • Rheumatology
  • Sports Medicine
  • Surgery
  • Urology
© Hulib   Haartmaninkatu 4, 00014 Helsingin yliopisto    +358 2941 26643   library[ät]helsinki.fi
Opening Hours
Terkko on Twitter Terkko on Facebook Terkko on Instragram Terkko on Pinterest rss location map Bookmark and Share Feedback Help Terms of use
feedback