Search Results for - Narrowed by: Springer E-Book Collection - Mathematics of Computing. - 2017 - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Mathematics$002bof$002bComputing.$002509Mathematics$002bof$002bComputing.$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092017$0025092017$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-29T23:34:37Z Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Geometric Science of Information Third International Conference, GSI 2017, Paris, France, November 7-9, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226834 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Nielsen, Frank. editor. (orcid)0000-0001-5728-0726<br/><a href="https://doi.org/10.1007/978-3-319-68445-1">https://doi.org/10.1007/978-3-319-68445-1</a><br/>Format:&#160;Electronic Resources<br/> BNAIC 2016: Artificial Intelligence 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226552 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Bosse, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67468-1">https://doi.org/10.1007/978-3-319-67468-1</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles. Technologies and Services for Smart Cities 4th International Conference, IOV 2017, Kanazawa, Japan, November 22-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221701 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72329-7">https://doi.org/10.1007/978-3-319-72329-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224011 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59081-3">https://doi.org/10.1007/978-3-319-59081-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226877 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59072-1">https://doi.org/10.1007/978-3-319-59072-1</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225660 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Bl&ouml;mer, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8&ndash;9, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221766 2024-05-29T23:34:37Z 2024-05-29T23:34:37Z Yazar&#160;Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format:&#160;Electronic Resources<br/>