Search Results for - Narrowed by: Management of Computing and Information Systems. - Computer software.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026ps$003d300?2024-05-13T11:10:26ZParadigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261582024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Phan, Raphaël C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2269352024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2217302024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Ma, Liran. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60033-8">https://doi.org/10.1007/978-3-319-60033-8</a><br/>Format: Electronic Resources<br/>Computer Algebra in Scientific Computing 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2222432024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Gerdt, Vladimir P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66320-3">https://doi.org/10.1007/978-3-319-66320-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2017 The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2249732024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2244262024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252782024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2254082024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format: Electronic Resources<br/>Unraveling Software Maintenance and Evolution Thinking Outside the Boxent://SD_ILS/0/SD_ILS:2256332024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Varga, Ervin. author.<br/><a href="https://doi.org/10.1007/978-3-319-71303-8">https://doi.org/10.1007/978-3-319-71303-8</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2253772024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259462024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format: Electronic Resources<br/>Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213542024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225602024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format: Electronic Resources<br/>Simulation and Synthesis in Medical Imaging Second International Workshop, SASHIMI 2017, Held in Conjunction with MICCAI 2017, Québec City, QC, Canada, September 10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231212024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Tsaftaris, Sotirios A. editor. (orcid)0000-0002-8795-9294<br/><a href="https://doi.org/10.1007/978-3-319-68127-6">https://doi.org/10.1007/978-3-319-68127-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2215712024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2261472024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2268812024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2257002024-05-13T11:10:26Z2024-05-13T11:10:26ZYazar Rass, Stefan. editor. (orcid)0000-0003-2821-2489<br/><a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format: Electronic Resources<br/>