Search Results for Data Encryption. - Narrowed by: Weippl, Edgar. editor.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026qf$003dAUTHOR$002509Yazar$002509Weippl$00252C$002bEdgar.$002beditor.$002509Weippl$00252C$002bEdgar.$002beditor.$0026ps$003d300?2024-07-05T21:17:55ZComputer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:233422024-07-05T21:17:55Z2024-07-05T21:17:55ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:233432024-07-05T21:17:55Z2024-07-05T21:17:55ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183312024-07-05T21:17:55Z2024-07-05T21:17:55ZYazar Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>