<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "cryptography"</title>
    <description>Showing 1 - 50 results of 1649</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22cryptography%22&amp;type=AllFields&amp;lng=en</link>
    <opensearch:totalResults>1649</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22cryptography%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22cryptography%22&amp;type=AllFields&amp;lng=en"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22cryptography%22&amp;type=AllFields&amp;lng=en&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22cryptography%22&amp;type=AllFields&amp;lng=en&amp;page=33"/>
    <item>
      <title>Chaos, Complexity and Leadership 2013</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-09710-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-09710-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intelligent Distributed Computing VIII</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-10422-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-10422-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The Whole Truth About Whole Numbers An Elementary Introduction to Number Theory /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-11035-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-11035-6</guid>
      <author>Forman, Sylvia</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Forman, Sylvia</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Timing Channels in Cryptography A Micro-Architectural Perspective /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-12370-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-12370-7</guid>
      <author>Rebeiro, Chester</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Rebeiro, Chester</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15943-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15943-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Applied Reconfigurable Computing 11th International Symposium, ARC 2015, Bochum, Germany, April 13-17, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16214-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16214-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16277-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16277-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16363-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16363-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Genetic Programming 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16501-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16501-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16745-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16745-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16763-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16763-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Coding Theory and Applications 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17296-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17296-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17533-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17533-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Algebraic Design Theory and Hadamard Matrices ADTHM, Lethbridge, Alberta, Canada, July 2014 /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17729-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17729-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computation, Cryptography, and Network Security</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18275-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18275-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18467-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18467-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18500-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18500-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Rational Points on Elliptic Curves</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18588-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18588-0</guid>
      <author>Silverman, Joseph H.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Silverman, Joseph H.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18681-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18681-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19321-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19321-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19962-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19962-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21356-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21356-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computing and Combinatorics 21st International Conference, COCOON 2015, Beijing, China, August 4-6, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21398-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21398-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Developments in Language Theory 19th International Conference, DLT 2015, Liverpool, UK, July 27-30, 2015, Proceedings. /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21500-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21500-6</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Algebra for Applications Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21951-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21951-6</guid>
      <author>Slinko, Arkadii</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Slinko, Arkadii</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21966-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21966-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22174-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22174-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Applied Number Theory</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22321-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22321-6</guid>
      <author>Niederreiter, Harald</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Niederreiter, Harald</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22425-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22425-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22915-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22915-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-23021-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-23021-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-23318-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-23318-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Visual Cryptography for Image Processing and Security Theory, Methods, and Applications /</title>
      <pubDate>Thu, 01 Jan 2015 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-23473-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-23473-1</guid>
      <author>Liu, Feng</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Liu, Feng</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Contemporary Optoelectronics Materials, Metamaterials and Device Applications /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-94-017-7315-7</link>
      <guid>https://find.library.upatras.gr/Record/978-94-017-7315-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Guide to Discrete Mathematics An Accessible Introduction to the History, Theory, Logic and Applications /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-44561-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-44561-8</guid>
      <author>O'Regan, Gerard</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>O'Regan, Gerard</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-30222-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-30222-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-55227-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-55227-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Compression-Based Methods of Statistical Analysis and Prediction of Time Series</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32253-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32253-7</guid>
      <author>Ryabko, Boris</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Ryabko, Boris</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security-Aware Device-to-Device Communications Underlaying Cellular Networks</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32458-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32458-6</guid>
      <author>Zhang, Aiqing</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Zhang, Aiqing</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ten Laws for Security</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-42641-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-42641-9</guid>
      <author>Diehl, Eric</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Diehl, Eric</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-662-49099-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-662-49099-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computing and Combinatorics 22nd International Conference, COCOON 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-42634-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-42634-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-47560-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-47560-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-50011-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-50011-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-662-49384-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-662-49384-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-31517-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-31517-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-29938-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-29938-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 1 /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-10-0129-1</link>
      <guid>https://find.library.upatras.gr/Record/978-981-10-0129-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-48965-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-48965-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography Made Simple</title>
      <pubDate>Fri, 01 Jan 2016 07:27:41 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21936-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21936-3</guid>
      <author>Smart, Nigel P.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Smart, Nigel P.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
