Search Results for - Narrowed by: Biometrics. - Computer Communication Networks. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Biometrics.$002509Biometrics.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300$0026isd$003dtrue? 2024-06-21T17:07:25Z Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085327 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085302 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:2084722 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085921 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Multimodal Processing and Interaction Audio, Video, Text ent://SD_ILS/0/SD_ILS:501865 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Maragos, Petros. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-76316-3">http://dx.doi.org/10.1007/978-0-387-76316-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Economics of Identity Theft: Avoidance, Causes and Possible Cures ent://SD_ILS/0/SD_ILS:505817 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format:&#160;Electronic Resources<br/> Sequence Data Mining ent://SD_ILS/0/SD_ILS:505895 2024-06-21T17:07:25Z 2024-06-21T17:07:25Z by&#160;Dong, Guozhu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69937-0">http://dx.doi.org/10.1007/978-0-387-69937-0</a><br/>Format:&#160;Electronic Resources<br/>