Search Results for - Narrowed by: Data protection. - Information Systems Applications (incl. Internet). - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-06-20T23:55:59ZSecurity, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-20T23:55:59Z2024-06-20T23:55:59Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-06-20T23:55:59Z2024-06-20T23:55:59Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-20T23:55:59Z2024-06-20T23:55:59Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>