Search Results for - Narrowed by: Springer E-Book Collection - Systems and Data Security. - Data Structures and Information Theory.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bStructures$002band$002bInformation$002bTheory.$002509Data$002bStructures$002band$002bInformation$002bTheory.$0026ps$003d300?2024-05-19T11:32:37ZTheory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4278942024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4281882024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279802024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224732024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2224442024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:2248462024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224522024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2232792024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysisent://SD_ILS/0/SD_ILS:2211222024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Nakahara Jr., Jorge. author.<br/><a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:2213982024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2214882024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220482024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2224832024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231522024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:2247302024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2218202024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:2223232024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format: Electronic Resources<br/>Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222602024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Iliopoulos, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2266332024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5–7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254252024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-319-59876-5">https://doi.org/10.1007/978-3-319-59876-5</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2247002024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54407-6">https://doi.org/10.1007/978-3-319-54407-6</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:2251832024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format: Electronic Resources<br/>Compilation for Secure Multi-party Computationent://SD_ILS/0/SD_ILS:2257222024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Büscher, Niklas. author.<br/><a href="https://doi.org/10.1007/978-3-319-67522-0">https://doi.org/10.1007/978-3-319-67522-0</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 14th International Conference, MobiWIS 2017, Prague, Czech Republic, August 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2264702024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65515-4">https://doi.org/10.1007/978-3-319-65515-4</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2223142024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213432024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Puliafito, Antonio. editor. (orcid)0000-0003-0385-2711<br/><a href="https://doi.org/10.1007/978-3-319-67910-5">https://doi.org/10.1007/978-3-319-67910-5</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217662024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2231502024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:2236552024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54526-4">https://doi.org/10.1007/978-3-319-54526-4</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2240622024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54427-4">https://doi.org/10.1007/978-3-319-54427-4</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Applications, Services and Contexts Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2250142024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58536-9">https://doi.org/10.1007/978-3-319-58536-9</a><br/>Format: Electronic Resources<br/>Verifiable Privacy Protection for Vehicular Communication Systemsent://SD_ILS/0/SD_ILS:2243662024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Förster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format: Electronic Resources<br/>Predictive Computing and Information Securityent://SD_ILS/0/SD_ILS:2260532024-05-19T11:32:37Z2024-05-19T11:32:37ZYazar Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format: Electronic Resources<br/>