Search Results for - Narrowed by: Springer E-Book Collection - Computer science. - Computer security. - Computing Milieux.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computing$002bMilieux.$002509Computing$002bMilieux.$0026ps$003d300$0026isd$003dtrue?2024-09-27T10:11:02ZSecurity and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2224442024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2224832024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2232792024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224522024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227492024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2264892024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2212112024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Ceci, Michelangelo. editor. (orcid)0000-0002-6690-7583<br/><a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2234452024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Ceci, Michelangelo. editor. (orcid)0000-0002-6690-7583<br/><a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2241402024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-68063-7">https://doi.org/10.1007/978-3-319-68063-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254982024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format: Electronic Resources<br/>Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265952024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2268462024-09-27T10:11:02Z2024-09-27T10:11:02ZYazar Altun, Yasemin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format: Electronic Resources<br/>