Search Results for - Narrowed by: Online Library - Electronic Library - Computer science. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ic$003dtrue$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300?dt=list 2024-07-17T19:03:21Z Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:330828 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330828.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Brief History of Cryptology and Cryptographic Algorithms ent://SD_ILS/0/SD_ILS:332881 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Dooley, John F. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332881.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01628-3">http://dx.doi.org/10.1007/978-3-319-01628-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business Process Management Workshops BPM 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers ent://SD_ILS/0/SD_ILS:334166 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Rosa, Marcello. editor.&#160;Soffer, Pnina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334166.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36285-9">http://dx.doi.org/10.1007/978-3-642-36285-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334236 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;J&uuml;rjens, Jan. editor.&#160;Livshits, Benjamin. editor.&#160;Scandariato, Riccardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334236.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory and Applications of Models of Computation 10th International Conference, TAMC 2013, Hong Kong, China, May 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334564 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Chan, T-H. Hubert. editor.&#160;Lau, Lap Chi. editor.&#160;Trevisan, Luca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334564.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38236-9">http://dx.doi.org/10.1007/978-3-642-38236-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:334810 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;B&ouml;hme, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Concise Guide to Databases A Practical Introduction ent://SD_ILS/0/SD_ILS:331224 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Lake, Peter. author.&#160;Crowther, Paul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331224.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5601-7">http://dx.doi.org/10.1007/978-1-4471-5601-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331796.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computational Science, Engineering and Information Technology Proceedings of the Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), KTO Karatay University, June 7-9, 2013, Konya,Turkey - Volume 1 ent://SD_ILS/0/SD_ILS:332821 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Nagamalai, Dhinaharan. editor.&#160;Kumar, Ashok. editor.&#160;Annamalai, Annamalai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332821.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00951-3">http://dx.doi.org/10.1007/978-3-319-00951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography with Maple ent://SD_ILS/0/SD_ILS:333533 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;G&oacute;mez Pardo, Jos&eacute; Luis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333533.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:334984 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Buchmann, Johannes A. author.&#160;Karatsiolis, Evangelos. author.&#160;Wiesmaier, Alexander. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cellular Automata and Discrete Complex Systems 19th International Workshop, AUTOMATA 2013, Gie&szlig;en, Germany, September 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335022 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Kari, Jarkko. editor.&#160;Kutrib, Martin. editor.&#160;Malcher, Andreas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40867-0">http://dx.doi.org/10.1007/978-3-642-40867-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physically Unclonable Functions Constructions, Properties and Applications ent://SD_ILS/0/SD_ILS:335102 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Maes, Roel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335102.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41395-7">http://dx.doi.org/10.1007/978-3-642-41395-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335119 2024-07-17T19:03:21Z 2024-07-17T19:03:21Z Author&#160;Afek, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335119.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41527-2">http://dx.doi.org/10.1007/978-3-642-41527-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>