Search Results for - Narrowed by: Artificial intelligence. - Cryptology.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Artificial$002bintelligence.$002509Artificial$002bintelligence.$0026qf$003dSUBJECT$002509Subject$002509Cryptology.$002509Cryptology.$0026ps$003d300?2024-06-04T23:00:21ZAdvances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20854532024-06-04T23:00:21Z2024-06-04T23:00:21Zby Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712024-06-04T23:00:21Z2024-06-04T23:00:21Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841372024-06-04T23:00:21Z2024-06-04T23:00:21Zby Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652024-06-04T23:00:21Z2024-06-04T23:00:21Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850522024-06-04T23:00:21Z2024-06-04T23:00:21Zby Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855522024-06-04T23:00:21Z2024-06-04T23:00:21Zby Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856502024-06-04T23:00:21Z2024-06-04T23:00:21Zby Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-06-04T23:00:21Z2024-06-04T23:00:21Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-06-04T23:00:21Z2024-06-04T23:00:21Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853512024-06-04T23:00:21Z2024-06-04T23:00:21Zby Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852422024-06-04T23:00:21Z2024-06-04T23:00:21Zby Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854982024-06-04T23:00:21Z2024-06-04T23:00:21Zby Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858772024-06-04T23:00:21Z2024-06-04T23:00:21Zby Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843202024-06-04T23:00:21Z2024-06-04T23:00:21Zby Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851312024-06-04T23:00:21Z2024-06-04T23:00:21Zby Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852732024-06-04T23:00:21Z2024-06-04T23:00:21Zby Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20849222024-06-04T23:00:21Z2024-06-04T23:00:21Zby Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860642024-06-04T23:00:21Z2024-06-04T23:00:21Zby Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932024-06-04T23:00:21Z2024-06-04T23:00:21Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20855912024-06-04T23:00:21Z2024-06-04T23:00:21Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855922024-06-04T23:00:21Z2024-06-04T23:00:21Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855932024-06-04T23:00:21Z2024-06-04T23:00:21Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Unconventional Computation and Natural Computation 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860912024-06-04T23:00:21Z2024-06-04T23:00:21Zby Stepney, Susan. editor. (orcid)0000-0003-3146-5401<br/><a href="https://doi.org/10.1007/978-3-319-92435-9">https://doi.org/10.1007/978-3-319-92435-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844332024-06-04T23:00:21Z2024-06-04T23:00:21Zby Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855612024-06-04T23:00:21Z2024-06-04T23:00:21Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857432024-06-04T23:00:21Z2024-06-04T23:00:21Zby Freivalds, Rūsiņš Mārtiņš. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49192-8">https://doi.org/10.1007/978-3-662-49192-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-06-04T23:00:21Z2024-06-04T23:00:21Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-06-04T23:00:21Z2024-06-04T23:00:21Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20862092024-06-04T23:00:21Z2024-06-04T23:00:21Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>