Search Results for - Narrowed by: Computer network architectures. - Data structures (Computer scienc. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Konu$002509Data$002bstructures$002b$002528Computer$002bscienc.$002509Data$002bstructures$002b$002528Computer$002bscienc.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-09-24T02:08:29ZSecurity and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2224442024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224522024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2224832024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Applications, Services and Contexts Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2250142024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58536-9">https://doi.org/10.1007/978-3-319-58536-9</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217662024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2266332024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format: Electronic Resources<br/>Verifiable Privacy Protection for Vehicular Communication Systemsent://SD_ILS/0/SD_ILS:2243662024-09-24T02:08:29Z2024-09-24T02:08:29ZYazar Förster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format: Electronic Resources<br/>