Search Results for - Narrowed by: Springer E-Book Collection - 2014 - Computers and civilization. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-20T18:16:13Z Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21166 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20448 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20867 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23951 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24437 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24621 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24097 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 &ndash; August 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24476 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20877 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06749-0">http://dx.doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21491 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21918 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22219 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and International Relations Theory, Prospects and Challenges ent://SD_ILS/0/SD_ILS:23697 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Kremer, Jan-Frederik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37481-4">http://dx.doi.org/10.1007/978-3-642-37481-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24081 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24582 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24424 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/> Socio-technical Design of Ubiquitous Computing Systems ent://SD_ILS/0/SD_ILS:20594 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;David, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05044-7">http://dx.doi.org/10.1007/978-3-319-05044-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21670 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21902 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22047 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21185 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21199 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:19546 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20890 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21769 2024-06-20T18:16:13Z 2024-06-20T18:16:13Z Yazar&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>