Search Results for - Narrowed by: Springer E-Book Collection - Systems and Data Security. - Mathematics of Computing.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Mathematics$002bof$002bComputing.$002509Mathematics$002bof$002bComputing.$0026ps$003d300?2024-05-19T18:42:58ZGraphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papersent://SD_ILS/0/SD_ILS:4276472024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810<br/><a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2212472024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>BNAIC 2016: Artificial Intelligence 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265522024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Bosse, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67468-1">https://doi.org/10.1007/978-3-319-67468-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Geometric Science of Information Third International Conference, GSI 2017, Paris, France, November 7-9, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2268342024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Nielsen, Frank. editor. (orcid)0000-0001-5728-0726<br/><a href="https://doi.org/10.1007/978-3-319-68445-1">https://doi.org/10.1007/978-3-319-68445-1</a><br/>Format: Electronic Resources<br/>Internet of Vehicles. Technologies and Services for Smart Cities 4th International Conference, IOV 2017, Kanazawa, Japan, November 22-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2217012024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72329-7">https://doi.org/10.1007/978-3-319-72329-7</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217662024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21–26, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2240112024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59081-3">https://doi.org/10.1007/978-3-319-59081-3</a><br/>Format: Electronic Resources<br/>Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2256602024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Blömer, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21–26, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2268772024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59072-1">https://doi.org/10.1007/978-3-319-59072-1</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181192024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Cheng, Long. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40663-3">http://dx.doi.org/10.1007/978-3-319-40663-3</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:186112024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:248462024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:246922024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-05-19T18:42:58Z2024-05-19T18:42:58ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>