Search Results for Computer science. - Narrowed by: Data structures (Computer scienc. - Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Data$002bstructures$002b$002528Computer$002bscienc.$002509Data$002bstructures$002b$002528Computer$002bscienc.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2024-07-04T05:12:41ZInformation Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:2251832024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:2220602024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:2210592024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:2213982024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220562024-07-04T05:12:41Z2024-07-04T05:12:41ZYazar Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>