Search Results for - Narrowed by: User Interfaces and Human Computer Interaction. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-06-02T16:39:59ZElectronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-06-02T16:39:59Z2024-06-02T16:39:59Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:20847392024-06-02T16:39:59Z2024-06-02T16:39:59Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026942024-06-02T16:39:59Z2024-06-02T16:39:59Zby Lipp, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Securing Biometrics Applicationsent://SD_ILS/0/SD_ILS:5016522024-06-02T16:39:59Z2024-06-02T16:39:59Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:5086252024-06-02T16:39:59Z2024-06-02T16:39:59Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-659-9">http://dx.doi.org/10.1007/978-1-84628-659-9</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130092024-06-02T16:39:59Z2024-06-02T16:39:59Zby Denko, Mieso K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114342024-06-02T16:39:59Z2024-06-02T16:39:59Zby Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-06-02T16:39:59Z2024-06-02T16:39:59Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-06-02T16:39:59Z2024-06-02T16:39:59Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing – EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105702024-06-02T16:39:59Z2024-06-02T16:39:59Zby Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format: Electronic Resources<br/>