Search Results for Business and Management. - Narrowed by: 2015 - Data encryption (Computer science). SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dBusiness$002band$002bManagement.$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2024-08-29T13:25:14Z Attribute-based Credentials for Trust Identity in the Information Society ent://SD_ILS/0/SD_ILS:22242 2024-08-29T13:25:14Z 2024-08-29T13:25:14Z Yazar&#160;Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:23424 2024-08-29T13:25:14Z 2024-08-29T13:25:14Z Yazar&#160;Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23496 2024-08-29T13:25:14Z 2024-08-29T13:25:14Z Yazar&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24852 2024-08-29T13:25:14Z 2024-08-29T13:25:14Z Yazar&#160;Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/>