Search Results for SpringerLink (Online service) - Narrowed by: Jajodia, Sushil. editor. - Computer science. - Data Encryption.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSpringerLink$002b$002528Online$002bservice$002529$0026qf$003dAUTHOR$002509Yazar$002509Jajodia$00252C$002bSushil.$002beditor.$002509Jajodia$00252C$002bSushil.$002beditor.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?2024-08-06T13:42:36ZInformation Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-08-06T13:42:36Z2024-08-06T13:42:36ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-08-06T13:42:36Z2024-08-06T13:42:36ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-08-06T13:42:36Z2024-08-06T13:42:36ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-08-06T13:42:36Z2024-08-06T13:42:36ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>