Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Theory of Computation. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Theory$002bof$002bComputation.$002509Theory$002bof$002bComputation.$0026ps$003d300$0026isd$003dtrue? 2024-05-30T05:42:15Z Applied Computer Sciences in Engineering 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427703 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Figueroa-Garc&iacute;a, Juan Carlos. editor. (orcid)0000-0001-5544-5937<br/><a href="https://doi.org/10.1007/978-3-030-31019-6">https://doi.org/10.1007/978-3-030-31019-6</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers ent://SD_ILS/0/SD_ILS:427647 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810<br/><a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428411 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Nielson, Flemming. editor. (orcid)0000-0001-7362-6176<br/><a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format:&#160;Electronic Resources<br/> The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday ent://SD_ILS/0/SD_ILS:429255 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Alvim, M&aacute;rio S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:225556 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93713-7">https://doi.org/10.1007/978-3-319-93713-7</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224683 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93698-7">https://doi.org/10.1007/978-3-319-93698-7</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224647 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format:&#160;Electronic Resources<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification Second International Conference, RSSRail 2017, Pistoia, Italy, November 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223239 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Fantechi, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68499-4">https://doi.org/10.1007/978-3-319-68499-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:23488 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24887 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24886 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24653 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:24654 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:20559 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21027 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:21446 2024-05-30T05:42:15Z 2024-05-30T05:42:15Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>