Search Results for - Narrowed by: Computer security. - Data Structures and Information Theory. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bStructures$002band$002bInformation$002bTheory.$002509Data$002bStructures$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-05-18T14:23:01Z Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427804 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:428188 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428867 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:427894 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427980 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/> Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis ent://SD_ILS/0/SD_ILS:221122 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Nakahara Jr., Jorge. author.<br/><a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225604 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222048 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:224730 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/> Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222473 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:222323 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format:&#160;Electronic Resources<br/> Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222260 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Iliopoulos, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:221488 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:221398 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223152 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221820 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222444 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222452 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7&ndash;9, 2018, Proceedings ent://SD_ILS/0/SD_ILS:223279 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format:&#160;Electronic Resources<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:224846 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222483 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:223655 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54526-4">https://doi.org/10.1007/978-3-319-54526-4</a><br/>Format:&#160;Electronic Resources<br/> Compilation for Secure Multi-party Computation ent://SD_ILS/0/SD_ILS:225722 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;B&uuml;scher, Niklas. author.<br/><a href="https://doi.org/10.1007/978-3-319-67522-0">https://doi.org/10.1007/978-3-319-67522-0</a><br/>Format:&#160;Electronic Resources<br/> Predictive Computing and Information Security ent://SD_ILS/0/SD_ILS:226053 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format:&#160;Electronic Resources<br/> Verifiable Privacy Protection for Vehicular Communication Systems ent://SD_ILS/0/SD_ILS:224366 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;F&ouml;rster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5&ndash;7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225425 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-319-59876-5">https://doi.org/10.1007/978-3-319-59876-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile Web and Intelligent Information Systems 14th International Conference, MobiWIS 2017, Prague, Czech Republic, August 21-23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226470 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65515-4">https://doi.org/10.1007/978-3-319-65515-4</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 &ndash; 25, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:222314 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221343 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Puliafito, Antonio. editor. (orcid)0000-0003-0385-2711<br/><a href="https://doi.org/10.1007/978-3-319-67910-5">https://doi.org/10.1007/978-3-319-67910-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 &ndash; 25, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:223150 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:224700 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54407-6">https://doi.org/10.1007/978-3-319-54407-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:224062 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54427-4">https://doi.org/10.1007/978-3-319-54427-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:225183 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Applications, Services and Contexts Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225014 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58536-9">https://doi.org/10.1007/978-3-319-58536-9</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8&ndash;9, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221766 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226633 2024-05-18T14:23:01Z 2024-05-18T14:23:01Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format:&#160;Electronic Resources<br/>