Search Results for - Narrowed by: Springer E-Book Collection - Systems and Data Security. - Mathematics of Computing. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Mathematics$002bof$002bComputing.$002509Mathematics$002bof$002bComputing.$0026ps$003d300? 2024-05-19T18:42:58Z Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers ent://SD_ILS/0/SD_ILS:427647 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810<br/><a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221247 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> BNAIC 2016: Artificial Intelligence 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226552 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Bosse, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67468-1">https://doi.org/10.1007/978-3-319-67468-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Geometric Science of Information Third International Conference, GSI 2017, Paris, France, November 7-9, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226834 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Nielsen, Frank. editor. (orcid)0000-0001-5728-0726<br/><a href="https://doi.org/10.1007/978-3-319-68445-1">https://doi.org/10.1007/978-3-319-68445-1</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles. Technologies and Services for Smart Cities 4th International Conference, IOV 2017, Kanazawa, Japan, November 22-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221701 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72329-7">https://doi.org/10.1007/978-3-319-72329-7</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8&ndash;9, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221766 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224011 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59081-3">https://doi.org/10.1007/978-3-319-59081-3</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225660 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Bl&ouml;mer, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226877 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59072-1">https://doi.org/10.1007/978-3-319-59072-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18119 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Cheng, Long. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40663-3">http://dx.doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:18611 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24887 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24886 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:24846 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:24692 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:24654 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24653 2024-05-19T18:42:58Z 2024-05-19T18:42:58Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>