Search Results for - Narrowed by: IYTE Library - Data Structures, Cryptology and Information Theory. - Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2024-06-25T02:28:40Z Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:501910 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:501913 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:501584 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:501518 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:502831 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:501627 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:501787 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:501583 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:501699 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:505504 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:512193 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:512950 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:505832 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:505647 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:505789 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:511946 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512931 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:512052 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513042 2024-06-25T02:28:40Z 2024-06-25T02:28:40Z by&#160;Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/>