Data Structures, Cryptology and Information Theory
Resource Information
The concept Data Structures, Cryptology and Information Theory represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Data Structures, Cryptology and Information Theory
Resource Information
The concept Data Structures, Cryptology and Information Theory represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Data Structures, Cryptology and Information Theory
124 Items that share the Concept Data Structures, Cryptology and Information Theory
Context
Context of Data Structures, Cryptology and Information TheorySubject of
No resources found
No enriched resources found
- Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings
- Advanced Communications and Multimedia Security : IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portorož, Slovenia
- Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008
- Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
- Algebraic Circuits
- An Introduction to Mathematical Cryptography
- Analytic Number Theory : In Honor of Helmut Maier?s 60th Birthday
- Analyzing Time Interval Data : Introducing an Information System for Time Interval Data Analysis
- Applied Algorithms : First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings
- Applied Number Theory
- Architectural Transformations in Network Services and Distributed Systems
- Authentication in Insecure Environments : Using Visual Cryptography and Non-Transferable Credentials in Practise
- Automata, Languages and Programming : 29th International Colloquium, ICALP 2002 Málaga, Spain, July 8-13, 2002 Proceedings
- Biometrics in the New World : The Cloud, Mobile Technology and Pervasive Identity
- Business Process Management Workshops : BPM 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers
- Cellular Automata and Discrete Complex Systems : 19th International Workshop, AUTOMATA 2013, Gießen, Germany, September 17-19, 2013. Proceedings
- Combinatorial Algorithms : 29th International Workshop, IWOCA 2018, Singapore, July 16?19, 2018, Proceedings
- Communications and Multimedia Security Issues of the New Century : IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany
- Compressive Sensing for the Photonic Mixer Device : Fundamentals, Methods and Results
- Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 ? 25, 2017, Revised Selected Papers, Part I
- Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 ? 25, 2017, Revised Selected Papers, Part II
- Computational Science and Its Applications ? ICCSA 2017 : 17th International Conference, Trieste, Italy, July 3-6, 2017, Proceedings, Part I
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part I
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part III
- Control Modes on Mobile Software Platforms : Empirical Studies on the Importance of Informal Control
- Cooperative OFDM Underwater Acoustic Communications
- Cryptanalytic Attacks on RSA
- Cryptography Made Simple
- Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
- Cryptography and Coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
- Cryptology Transmitted Message Protection : From Deterministic Chaos up to Optical Vortices
- Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
- Data Science Analytics and Applications : First International Conference, DaSAA 2017, Chennai, India, January 4-6, 2017, Revised Selected Papers
- Database and Application Security XV : IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada
- Digital Communication : Communication, Multimedia, Security
- Distributed Computing : 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013. Proceedings
- Distributed Computing : 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014. Proceedings
- Distributed Computing : 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings
- Distributed Computing : 30th International Symposium, DISC 2016, Paris, France, September 27-29, 2016. Proceedings
- Distributed and Parallel Embedded Systems : IFIP WG10.3/WG10.5 International Workshop on Distributed and Parallel Embedded Systems (DIPES'98) October 5-6, 1998, Schloß Eringerfeld, Germany
- Energy Time Series Forecasting : Efficient and Accurate Forecasting of Evolving Time Series from the Energy Domain
- Engineering Secure Software and Systems : 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings
- Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
- Engineering Secure Software and Systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings
- Environmental Software Systems : Environmental Information and Decision Support
- Evolution of Cyber Technologies and Operations to 2035
- Formal Methods for Open Object-Based Distributed Systems : IFIP TC6 / WG6.1 Third International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS), February 15?18, 1999, Florence, Italy
- Formal Methods for Open Object-Based Distributed Systems IV : IFIP TC6/WG6.1. Fourth International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2000) September 6-8, 2000, Stanford, California, USA
- Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
- Frontiers of Higher Order Fuzzy Sets
- Future Information Technology - II
- Genetic Programming : 21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018, Proceedings
- High Performance Networking : IFIP TC-6 Eighth International Conference on High Performance Networking (HPN'98) Vienna, Austria, September 21-25, 1998
- High-Dimensional and Low-Quality Visual Information Processing : From Structured Sensing and Understanding
- Homomorphic Signature Schemes : A Survey
- Human Aspects of IT for the Aged Population. Aging, Design and User Experience : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I
- Human Aspects of IT for the Aged Population. Applications, Services and Contexts : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II
- Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings
- ISSE 2006 - Securing Electronic Busines Processes : Highlights of the Information Security Solutions Europe 2006 Conference
- IT Security Risk Management in the Context of Cloud Computing : Towards an Understanding of the Key Role of Providers? IT Security Risk Perceptions
- Information Science and Applications (ICISA) 2016
- Information Security Technology for Applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
- Information Security Technology for Applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
- Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information Security and Assurance : International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
- Information Security for Global Information Infrastructures : IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China
- Information Technolog: New Generations : 13th International Conference on Information Technology
- Information Technology - New Generations : 15th International Conference on Information Technology
- Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
- Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
- Innovative Security Solutions for Information Technology and Communications : 10th International Conference, SecITC 2017, Bucharest, Romania, June 8?9, 2017, Revised Selected Papers
- Instruction Selection : Principles, Methods, and Applications
- Integrity and Internal Control in Information Systems : Strategic Views on the Need for Control
- Intelligence in Networks : IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99) November 22-26, 1999, Pathumthani, Thailand
- Intelligent Information Processing : IFIP 17th World Computer Congress -- TC12 Stream on Intelligent Information Processing August 25-30, 2002, Montréal, Québec, Canada
- Introduction to Cryptography : Principles and Applications
- Introduction to Security Reduction
- Knowledge-Based Driver Assistance Systems : Traffic Situation Description and Situation Feature Relevance
- Managing QoS in Multimedia Networks and Services : IEEE / IFIP TC6 -- WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceará, Brazil
- Mathematical Modelling for Next-Generation Cryptography : CREST Crypto-Math Project
- Mobile Web and Intelligent Information Systems : 14th International Conference, MobiWIS 2017, Prague, Czech Republic, August 21-23, 2017, Proceedings
- Number Theory : An Introduction via the Density of Primes
- Open Problems in Mathematics and Computational Science
- Personal Wireless Communications : IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdańsk, Poland
- Physical-Layer Security for Cooperative Relay Networks
- Principles of Security and Trust : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
- Privacy-Respecting Intrusion Detection
- Privately and Publicly Verifiable Computing Techniques : A Survey
- Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC ? 16?)
- Progress in Cryptology - AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
- Progress in VLSI Design and Test : 16th International Symposium, VDAT 2012, Shibpur, India, July 1-4, 2012. Proceedings
- Protocols for High-Speed Networks VI : IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High-Speed Networks (PfHSN '99) August 25-27, 1999, Salem, Massachusetts, USA
- Quality, Reliability, Security and Robustness in Heterogeneous Systems : 13th International Conference, QShine 2017, Dalian, China, December 16 -17, 2017, Proceedings
- Rainbow Connections of Graphs
- Rational Points on Elliptic Curves
- Recent Advances in Information Technology : RAIT-2014 Proceedings
- Reliable Software Technologies ? Ada-Europe 2018 : 23rd Ada-Europe International Conference on Reliable Software Technologies, Lisbon, Portugal, June 18-22, 2018, Proceedings
- SCION: A Secure Internet Architecture
- Secure Data Deletion
- Secure Information Networks : Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20-21, 1999, Leuven, Belgium
- Secure Multi-Party Non-Repudiation Protocols and Applications
- Securing Digital Video : Techniques for DRM and Content Protection
- Security and Privacy in the Age of Uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece
- Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
- Smart Cards, Tokens, Security and Applications
- Smart Networks : IFIP TC6 / WG6.7 Seventh International Conference on Intelligence in Networks (SmartNet 2002) April 8-10, 2002, Saariselkä, Lapland, Finland
- Social, Cultural, and Behavioral Modeling : 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings
- Symmetric Cryptographic Protocols
- Telecommunication Network Intelligence : IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18-22, 2000, Vienna, Austria
- Theoretical and Mathematical Foundations of Computer Science : Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011. Selected Papers
- Theory and Applications of Models of Computation : 10th International Conference, TAMC 2013, Hong Kong, China, May 20-22, 2013. Proceedings
- Theory and Applications of Models of Computation : 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014. Proceedings
- Theory and Applications of Models of Computation : 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings
- Theory and Applications of Models of Computation : 14th Annual Conference, TAMC 2017, Bern, Switzerland, April 20-22, 2017, Proceedings
- Timing Channels in Cryptography : A Micro-Architectural Perspective
- Tools and Algorithms for the Construction and Analysis of Systems : 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part I
- Transactions on Computational Science IV : Special Issue on Security in Computing
- Trustworthy Reconfigurable Systems : Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
- Tutorials on the Foundations of Cryptography : Dedicated to Oded Goldreich
- Understanding Intrusion Detection Through Visualization
- Usability : Gaining a Competitive Edge
- Verifiable Composition of Signature and Encryption : A Comprehensive Study of the Design Paradigms
- Verifiable Privacy Protection for Vehicular Communication Systems
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/lmxFpFPfHQw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/lmxFpFPfHQw/">Data Structures, Cryptology and Information Theory</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Data Structures, Cryptology and Information Theory
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/lmxFpFPfHQw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/lmxFpFPfHQw/">Data Structures, Cryptology and Information Theory</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>