Search Results for - Narrowed by: Telecommunication. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-05-30T04:08:14ZProceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:20863752024-05-30T04:08:14Z2024-05-30T04:08:14Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:20867692024-05-30T04:08:14Z2024-05-30T04:08:14Zby Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852024-05-30T04:08:14Z2024-05-30T04:08:14Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:20878932024-05-30T04:08:14Z2024-05-30T04:08:14Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882024-05-30T04:08:14Z2024-05-30T04:08:14Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy Concepts, Protocols, and Architecturesent://SD_ILS/0/SD_ILS:5034782024-05-30T04:08:14Z2024-05-30T04:08:14Zby Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>RFID Security Techniques, Protocols and System-on-Chip Designent://SD_ILS/0/SD_ILS:5018732024-05-30T04:08:14Z2024-05-30T04:08:14Zby Kitsos, Paris. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format: Electronic Resources<br/>Network-Aware Security for Group Communicationsent://SD_ILS/0/SD_ILS:5016322024-05-30T04:08:14Z2024-05-30T04:08:14Zby Sun, Yan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Wireless Network Securityent://SD_ILS/0/SD_ILS:5051842024-05-30T04:08:14Z2024-05-30T04:08:14Zby Xiao, Yang. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format: Electronic Resources<br/>Terrestrial Trunked Radio - Tetra A Global Security Toolent://SD_ILS/0/SD_ILS:5122952024-05-30T04:08:14Z2024-05-30T04:08:14Zby Stavroulakis, Peter. author.<br/><a href="http://dx.doi.org/10.1007/3-540-71192-9">http://dx.doi.org/10.1007/3-540-71192-9</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-05-30T04:08:14Z2024-05-30T04:08:14Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-05-30T04:08:14Z2024-05-30T04:08:14Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118572024-05-30T04:08:14Z2024-05-30T04:08:14Zby Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120152024-05-30T04:08:14Z2024-05-30T04:08:14Zby Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format: Electronic Resources<br/>Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5115742024-05-30T04:08:14Z2024-05-30T04:08:14Zby Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms: Design and Applicationsent://SD_ILS/0/SD_ILS:5042432024-05-30T04:08:14Z2024-05-30T04:08:14Zby Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522024-05-30T04:08:14Z2024-05-30T04:08:14Zby Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5100872024-05-30T04:08:14Z2024-05-30T04:08:14Zby Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105522024-05-30T04:08:14Z2024-05-30T04:08:14Zby Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format: Electronic Resources<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097172024-05-30T04:08:14Z2024-05-30T04:08:14Zby Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Secure Group Communications over Data Networksent://SD_ILS/0/SD_ILS:5040822024-05-30T04:08:14Z2024-05-30T04:08:14Zby Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>