Search Results for - Narrowed by: Springer Collection - Computer vision. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bvision.$002509Computer$002bvision.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-09-26T15:49:50Z VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:503340 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:503859 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/> Securing Biometrics Applications ent://SD_ILS/0/SD_ILS:501652 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format:&#160;Electronic Resources<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503670 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Biometrics ent://SD_ILS/0/SD_ILS:501662 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format:&#160;Electronic Resources<br/> Reliable Face Recognition Methods System Design, Impementation and Evaluation ent://SD_ILS/0/SD_ILS:505522 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Multibiometrics ent://SD_ILS/0/SD_ILS:505186 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format:&#160;Electronic Resources<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:504678 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/> Unconstrained Face Recognition ent://SD_ILS/0/SD_ILS:504921 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format:&#160;Electronic Resources<br/> Human Identification Based on Gait ent://SD_ILS/0/SD_ILS:504923 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Nixon, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format:&#160;Electronic Resources<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:504730 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509720 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication. ent://SD_ILS/0/SD_ILS:504166 2024-09-26T15:49:50Z 2024-09-26T15:49:50Z by&#160;SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>