Search Results for - Narrowed by: Biometrics. - Computer Communication Networks.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Biometrics.$002509Biometrics.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300$0026isd$003dtrue?2024-06-21T17:07:25ZBiometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853272024-06-21T17:07:25Z2024-06-21T17:07:25Zby Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853022024-06-21T17:07:25Z2024-06-21T17:07:25Zby Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:20847222024-06-21T17:07:25Z2024-06-21T17:07:25Zby Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859212024-06-21T17:07:25Z2024-06-21T17:07:25Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Multimodal Processing and Interaction Audio, Video, Textent://SD_ILS/0/SD_ILS:5018652024-06-21T17:07:25Z2024-06-21T17:07:25Zby Maragos, Petros. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-76316-3">http://dx.doi.org/10.1007/978-0-387-76316-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-21T17:07:25Z2024-06-21T17:07:25Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:5058172024-06-21T17:07:25Z2024-06-21T17:07:25Zby Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Sequence Data Miningent://SD_ILS/0/SD_ILS:5058952024-06-21T17:07:25Z2024-06-21T17:07:25Zby Dong, Guozhu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69937-0">http://dx.doi.org/10.1007/978-0-387-69937-0</a><br/>Format: Electronic Resources<br/>