Search Results for - Narrowed by: Springer Collection - Data Encryption. - Database management.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Database$002bmanagement.$002509Database$002bmanagement.$0026ps$003d300?
2024-09-25T22:44:20Z
Privacy-Preserving Data Mining Models and Algorithms
ent://SD_ILS/0/SD_ILS:501661
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:501583
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>
Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:503613
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>
Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:512846
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>
E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:513040
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:504690
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:505647
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>
Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:512889
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:505611
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>
Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:511681
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:505432
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>
Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:511625
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:504924
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>
Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:510351
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>
Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:510344
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), October 28–30, 2005, Poznan, Poland
ent://SD_ILS/0/SD_ILS:504944
2024-09-25T22:44:20Z
2024-09-25T22:44:20Z
by Funabashi, Matohisa. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format: Electronic Resources<br/>