Search Results for Data Structures. - Narrowed by: Computer security. - Data Encryption.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bStructures.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?2024-10-02T01:03:40ZSecurity in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:221782024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235682024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245422024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-10-02T01:03:40Z2024-10-02T01:03:40ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>