Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Image processing. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Image$002bprocessing.$002509Image$002bprocessing.$0026ps$003d300? 2024-05-15T11:59:09Z Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18631 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18682 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, P&oacute;voa de Varzim, Portugal, July 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18156 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:23293 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:24775 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:21367 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:24084 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:21497 2024-05-15T11:59:09Z 2024-05-15T11:59:09Z Yazar&#160;Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/>