Search Results for - Narrowed by: IYTE Library - Data Structures, Cryptology and Information Theory. - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2024-06-25T02:28:40ZInformation and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-06-25T02:28:40Z2024-06-25T02:28:40Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-06-25T02:28:40Z2024-06-25T02:28:40Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-06-25T02:28:40Z2024-06-25T02:28:40Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-06-25T02:28:40Z2024-06-25T02:28:40Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:5015182024-06-25T02:28:40Z2024-06-25T02:28:40Zby Karabulut, Yücel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:5028312024-06-25T02:28:40Z2024-06-25T02:28:40Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-06-25T02:28:40Z2024-06-25T02:28:40Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-06-25T02:28:40Z2024-06-25T02:28:40Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-06-25T02:28:40Z2024-06-25T02:28:40Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Handbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-06-25T02:28:40Z2024-06-25T02:28:40Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-06-25T02:28:40Z2024-06-25T02:28:40Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142024-06-25T02:28:40Z2024-06-25T02:28:40Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:5055042024-06-25T02:28:40Z2024-06-25T02:28:40Zby Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Trust in Modern Data Managementent://SD_ILS/0/SD_ILS:5121932024-06-25T02:28:40Z2024-06-25T02:28:40Zby Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-06-25T02:28:40Z2024-06-25T02:28:40Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:5129502024-06-25T02:28:40Z2024-06-25T02:28:40Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:5058322024-06-25T02:28:40Z2024-06-25T02:28:40Zby Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472024-06-25T02:28:40Z2024-06-25T02:28:40Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:5057892024-06-25T02:28:40Z2024-06-25T02:28:40Zby Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-06-25T02:28:40Z2024-06-25T02:28:40Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129312024-06-25T02:28:40Z2024-06-25T02:28:40Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:5120522024-06-25T02:28:40Z2024-06-25T02:28:40Zby Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-06-25T02:28:40Z2024-06-25T02:28:40Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>