Search Results for - Narrowed by: Computers and civilization. - Systems and Data Security. - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-06-04T17:16:13ZOpen Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180852024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:172392024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:183442024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:183452024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180732024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:181722024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183972024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:182312024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:180892024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Bécue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234002024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>E-Democracy – Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235702024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:233422024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235922024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:228422024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:233432024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235042024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:214912024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:240972024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 – August 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244762024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:204482024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211852024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:217692024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:219022024-06-04T17:16:13Z2024-06-04T17:16:13ZYazar Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>