Search Results for -- ANSİKLOPEDİLER. - Narrowed by: Mitchell, Chris J. editor. - Coding theory. - Data encryption (Computer science). - Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bANS$0025C4$0025B0KLOPED$0025C4$0025B0LER.$0026qf$003dAUTHOR$002509Author$002509Mitchell$00252C$002bChris$002bJ.$002beditor.$002509Mitchell$00252C$002bChris$002bJ.$002beditor.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300?2024-08-26T05:56:01ZInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1907852024-08-26T05:56:01Z2024-08-26T05:56:01ZAuthor Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1915922024-08-26T05:56:01Z2024-08-26T05:56:01ZAuthor Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>