Search Results for - Narrowed by: Springer E-Book Collection - 2014 - Computers and civilization. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-20T18:16:13ZConstructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:211662024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Bissyandé, Tegawendé F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:204482024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208672024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:239512024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244372024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:240972024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Electronic Resources<br/>ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 – August 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244762024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208772024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06749-0">http://dx.doi.org/10.1007/978-3-319-06749-0</a><br/>Format: Electronic Resources<br/>Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:214912024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:219182024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Cyberspace and International Relations Theory, Prospects and Challengesent://SD_ILS/0/SD_ILS:236972024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Kremer, Jan-Frederik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37481-4">http://dx.doi.org/10.1007/978-3-642-37481-4</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240812024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:245822024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format: Electronic Resources<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244242024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Socio-technical Design of Ubiquitous Computing Systemsent://SD_ILS/0/SD_ILS:205942024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar David, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05044-7">http://dx.doi.org/10.1007/978-3-319-05044-7</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216702024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:219022024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:220472024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211852024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:195462024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:208902024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:217692024-06-20T18:16:13Z2024-06-20T18:16:13ZYazar Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>