Search Results for - Narrowed by: Computer security. - Information theory.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Information$002btheory.$002509Information$002btheory.$0026ps$003d300?2024-05-17T21:48:43ZE-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280022024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283062024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4284002024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2019 Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276902024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Joshi, James. editor. (orcid)0000-0003-4519-9802<br/><a href="https://doi.org/10.1007/978-3-030-23404-1">https://doi.org/10.1007/978-3-030-23404-1</a><br/>Format: Electronic Resources<br/>Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282162024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287412024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Choffnes, David. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15986-3">https://doi.org/10.1007/978-3-030-15986-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281792024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890<br/><a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287602024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Polian, Ilia. editor. (orcid)0000-0002-6563-2725<br/><a href="https://doi.org/10.1007/978-3-030-16350-1">https://doi.org/10.1007/978-3-030-16350-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288252024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format: Electronic Resources<br/>Advances in Cyber Security: Principles, Techniques, and Applicationsent://SD_ILS/0/SD_ILS:4283982024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290992024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289792024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>ICT Unbounded, Social Impact of Bright ICT Adoption IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4292512024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Dwivedi, Yogesh. editor. (orcid)0000-0002-5547-9990<br/><a href="https://doi.org/10.1007/978-3-030-20671-0">https://doi.org/10.1007/978-3-030-20671-0</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11–13, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2255562024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93713-7">https://doi.org/10.1007/978-3-319-93713-7</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2246472024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2246832024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93698-7">https://doi.org/10.1007/978-3-319-93698-7</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification Second International Conference, RSSRail 2017, Pistoia, Italy, November 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232392024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Fantechi, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68499-4">https://doi.org/10.1007/978-3-319-68499-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-17T21:48:43Z2024-05-17T21:48:43ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>