Search Results for - Narrowed by: Management of Computing and Information Systems. - Computer software. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026ps$003d300? 2024-05-13T11:10:26Z Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221730 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Ma, Liran. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60033-8">https://doi.org/10.1007/978-3-319-60033-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Algebra in Scientific Computing 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222243 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Gerdt, Vladimir P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66320-3">https://doi.org/10.1007/978-3-319-66320-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225278 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:225408 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format:&#160;Electronic Resources<br/> Unraveling Software Maintenance and Evolution Thinking Outside the Box ent://SD_ILS/0/SD_ILS:225633 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Varga, Ervin. author.<br/><a href="https://doi.org/10.1007/978-3-319-71303-8">https://doi.org/10.1007/978-3-319-71303-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225377 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225946 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221354 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7&ndash;9, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222560 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format:&#160;Electronic Resources<br/> Simulation and Synthesis in Medical Imaging Second International Workshop, SASHIMI 2017, Held in Conjunction with MICCAI 2017, Qu&eacute;bec City, QC, Canada, September 10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223121 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Tsaftaris, Sotirios A. editor. (orcid)0000-0002-8795-9294<br/><a href="https://doi.org/10.1007/978-3-319-68127-6">https://doi.org/10.1007/978-3-319-68127-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:221571 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 &ndash; December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226619 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:226147 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226881 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225700 2024-05-13T11:10:26Z 2024-05-13T11:10:26Z Yazar&#160;Rass, Stefan. editor. (orcid)0000-0003-2821-2489<br/><a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format:&#160;Electronic Resources<br/>