Search Results for - Narrowed by: Computer science. - Data Structures and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$002band$002bInformation$002bTheory.$002509Data$002bStructures$002band$002bInformation$002bTheory.$0026ps$003d300?2024-06-15T09:15:09ZAdvances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-06-15T09:15:09Z2024-06-15T09:15:09Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20843782024-06-15T09:15:09Z2024-06-15T09:15:09Zby Odumuyiwa, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98827-6">https://doi.org/10.1007/978-3-319-98827-6</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20844022024-06-15T09:15:09Z2024-06-15T09:15:09Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20844032024-06-15T09:15:09Z2024-06-15T09:15:09Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850612024-06-15T09:15:09Z2024-06-15T09:15:09Zby Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Graphs in Biomedical Image Analysis and Integrating Medical Imaging and Non-Imaging Modalities Second International Workshop, GRAIL 2018 and First International Workshop, Beyond MIC 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851492024-06-15T09:15:09Z2024-06-15T09:15:09Zby Stoyanov, Danail. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00689-1">https://doi.org/10.1007/978-3-030-00689-1</a><br/>Format: Electronic Resources<br/>Developments in Language Theory 22nd International Conference, DLT 2018, Tokyo, Japan, September 10-14, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850432024-06-15T09:15:09Z2024-06-15T09:15:09Zby Hoshi, Mizuho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98654-8">https://doi.org/10.1007/978-3-319-98654-8</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 19th International Conference, ACIVS 2018, Poitiers, France, September 24–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853622024-06-15T09:15:09Z2024-06-15T09:15:09Zby Blanc-Talon, Jacques. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01449-0">https://doi.org/10.1007/978-3-030-01449-0</a><br/>Format: Electronic Resources<br/>Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843462024-06-15T09:15:09Z2024-06-15T09:15:09Zby Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855082024-06-15T09:15:09Z2024-06-15T09:15:09Zby Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Management Perspective for Transport Telematics 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papersent://SD_ILS/0/SD_ILS:20842992024-06-15T09:15:09Z2024-06-15T09:15:09Zby Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97955-7">https://doi.org/10.1007/978-3-319-97955-7</a><br/>Format: Electronic Resources<br/>Modelling and Verification of Secure Examsent://SD_ILS/0/SD_ILS:20846812024-06-15T09:15:09Z2024-06-15T09:15:09Zby Giustolisi, Rosario. author.<br/><a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851742024-06-15T09:15:09Z2024-06-15T09:15:09Zby Naccache, David. editor. (orcid)0000-0002-8651-6555<br/><a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format: Electronic Resources<br/>Principles and Practice of Constraint Programming 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852682024-06-15T09:15:09Z2024-06-15T09:15:09Zby Hooker, John. editor. (orcid)0000-0003-3169-1871<br/><a href="https://doi.org/10.1007/978-3-319-98334-9">https://doi.org/10.1007/978-3-319-98334-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856432024-06-15T09:15:09Z2024-06-15T09:15:09Zby Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Tools and Algorithms for the Construction and Analysis of Systems 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855872024-06-15T09:15:09Z2024-06-15T09:15:09Zby Beyer, Dirk. editor. (orcid)0000-0003-4832-7662<br/><a href="https://doi.org/10.1007/978-3-319-89960-2">https://doi.org/10.1007/978-3-319-89960-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855882024-06-15T09:15:09Z2024-06-15T09:15:09Zby Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-06-15T09:15:09Z2024-06-15T09:15:09Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-06-15T09:15:09Z2024-06-15T09:15:09Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Genetic Programming 21st European Conference, EuroGP 2018, Parma, Italy, April 4-6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20859412024-06-15T09:15:09Z2024-06-15T09:15:09Zby Castelli, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77553-1">https://doi.org/10.1007/978-3-319-77553-1</a><br/>Format: Electronic Resources<br/>Compression-Based Methods of Statistical Analysis and Prediction of Time Seriesent://SD_ILS/0/SD_ILS:20849452024-06-15T09:15:09Z2024-06-15T09:15:09Zby Ryabko, Boris. author.<br/><a href="https://doi.org/10.1007/978-3-319-32253-7">https://doi.org/10.1007/978-3-319-32253-7</a><br/>Format: Electronic Resources<br/>Cryptography Made Simpleent://SD_ILS/0/SD_ILS:20845492024-06-15T09:15:09Z2024-06-15T09:15:09Zby Smart, Nigel P. author.<br/><a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702024-06-15T09:15:09Z2024-06-15T09:15:09Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>