Search Results for - Narrowed by: English - Springer E-Book Collection - Application software. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Dil$002509ENG$002509English$0026qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Application$002bsoftware.$002509Application$002bsoftware.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?2024-06-17T00:00:43ZEthical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:4283582024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291962024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240<br/><a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4290242024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277382024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applicationsent://SD_ILS/0/SD_ILS:4277712024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Möller, Dietmar P.F. author.<br/><a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277582024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Fahrnberger, Günter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289142024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406<br/><a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290332024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183762024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183242024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248522024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233362024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235042024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:245822024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format: Electronic Resources<br/>Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:219022024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216702024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:245542024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44774-1">http://dx.doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246322024-06-17T00:00:43Z2024-06-17T00:00:43ZYazar Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>