Search Results for Architecture. - Narrowed by: TEDU library - Data Encryption. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dArchitecture.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300$0026isd$003dtrue? 2024-07-03T13:52:44Z Smart TV Security Media Playback and Digital Video Broadcast ent://SD_ILS/0/SD_ILS:23101 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Mich&eacute;le, Benjamin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20994-4">http://dx.doi.org/10.1007/978-3-319-20994-4</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:21229 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22540 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23129 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:21499 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:20814 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based Credentials for Trust Identity in the Information Society ent://SD_ILS/0/SD_ILS:22242 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23609 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:21004 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Heisel, Maritta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07452-8">http://dx.doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:19519 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:23735 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21959 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22822 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24735 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18627 2024-07-03T13:52:44Z 2024-07-03T13:52:44Z Yazar&#160;Freivalds, Rūsiņ&scaron; Mārtiņ&scaron;. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49192-8">http://dx.doi.org/10.1007/978-3-662-49192-8</a><br/>Format:&#160;Electronic Resources<br/>