Search Results for - Narrowed by: Springer E-Book Collection - Data encryption (Computer science). - Computer software. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026ps$003d300$0026isd$003dtrue? 2024-09-21T04:58:49Z Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221493 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:221562 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222811 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:223101 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/> Random Numbers and Computers ent://SD_ILS/0/SD_ILS:222849 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221354 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6&ndash;7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221372 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/><a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225377 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:225408 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format:&#160;Electronic Resources<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:223830 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:221571 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Computing and Communication First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:221678 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52015-5">https://doi.org/10.1007/978-3-319-52015-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222084 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 9th International Symposium, FPS 2016, Qu&eacute;bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222389 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225391 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7&ndash;9, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222560 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225278 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225946 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226881 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 &ndash; December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226619 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:226147 2024-09-21T04:58:49Z 2024-09-21T04:58:49Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format:&#160;Electronic Resources<br/>