Search Results for - Narrowed by: Telecommunication. - Data encryption (Computer science). SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2024-05-30T04:08:14Z Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:2086769 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:2084785 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:2087893 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:2084088 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> RFID Security and Privacy Concepts, Protocols, and Architectures ent://SD_ILS/0/SD_ILS:503478 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format:&#160;Electronic Resources<br/> RFID Security Techniques, Protocols and System-on-Chip Design ent://SD_ILS/0/SD_ILS:501873 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Kitsos, Paris. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:501632 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Sun, Yan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:505184 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Xiao, Yang. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/> Terrestrial Trunked Radio - Tetra A Global Security Tool ent://SD_ILS/0/SD_ILS:512295 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Stavroulakis, Peter. author.<br/><a href="http://dx.doi.org/10.1007/3-540-71192-9">http://dx.doi.org/10.1007/3-540-71192-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512998 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:504916 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511857 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512015 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format:&#160;Electronic Resources<br/> Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511574 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms: Design and Applications ent://SD_ILS/0/SD_ILS:504243 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:504252 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510087 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510552 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509717 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:504082 2024-05-30T04:08:14Z 2024-05-30T04:08:14Z by&#160;Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/>