Search Results for - Narrowed by: Management of Computing and Information Systems. - Privacy. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Privacy.$002509Privacy.$0026ps$003d300? 2024-05-24T06:29:35Z Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:2084303 2024-05-24T06:29:35Z 2024-05-24T06:29:35Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ent://SD_ILS/0/SD_ILS:2084901 2024-05-24T06:29:35Z 2024-05-24T06:29:35Z by&#160;Lysne, Olav. author.<br/><a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-05-24T06:29:35Z 2024-05-24T06:29:35Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/>