Search Results for - Narrowed by: Computers and Society. - Data encryption (Computer science). - Legal Aspects of Computing. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Konu$002509Legal$002bAspects$002bof$002bComputing.$002509Legal$002bAspects$002bof$002bComputing.$0026ps$003d300? 2024-06-16T14:15:07Z Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428324 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427778 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428778 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429040 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226798 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223249 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222328 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222274 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222189 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224900 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221564 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222808 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224628 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222594 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221627 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225557 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226536 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226673 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224736 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225929 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224508 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221654 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13&ndash;15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222178 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226180 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18154 2024-06-16T14:15:07Z 2024-06-16T14:15:07Z Yazar&#160;Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/>