Search Results for - Narrowed by: Springer E-Book Collection - Computer communication systems. - Mobile and Network Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcommunication$002bsystems.$002509Computer$002bcommunication$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Mobile$002band$002bNetwork$002bSecurity.$002509Mobile$002band$002bNetwork$002bSecurity.$0026ps$003d300?2024-05-18T00:57:18ZSelected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284142024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4284002024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication 4th International Conference, SmartCom 2019, Birmingham, UK, October 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286052024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-34139-8">https://doi.org/10.1007/978-3-030-34139-8</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281152024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Bassioni, Ghada. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4277592024-05-18T00:57:18Z2024-05-18T00:57:18ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>