Search Results for Biometrics (Biology). - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBiometrics$002b$002528Biology$002529.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2024-11-13T20:13:05Z Biometric Recognition 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486068 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Sun, Zhenan. editor.&#160;He, Ran. editor.&#160;Feng, Jianjiang. editor.&#160;Shan, Shiguang. editor.&#160;Guo, Zhenhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31456-9">https://doi.org/10.1007/978-3-030-31456-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Imaging and its Security in Telemedicine Applications ent://SD_ILS/0/SD_ILS:487428 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Thanki, Rohit. author. (orcid)0000-0002-0645-6266&#160;Borra, Surekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics ent://SD_ILS/0/SD_ILS:483963 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Speech Enhancement Techniques for Digital Hearing Aids ent://SD_ILS/0/SD_ILS:482802 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Borisagar, Komal R. author.&#160;Thanki, Rohit M. author. (orcid)0000-0002-0645-6266&#160;Sedani, Bhavin S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485714 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:487393 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:488861 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Genovese, Angelo. author.&#160;Piuri, Vincenzo. author.&#160;Scotti, Fabio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-11-13T20:13:05Z 2024-11-13T20:13:05Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>