Search Results for COMPUTERS -- Computer Science. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bComputer$002bScience.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-11T12:40:55ZGraphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papersent://SD_ILS/0/SD_ILS:4827092025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810 Horne, Ross. editor. (orcid)0000-0003-0162-1901 Probst, Christian W. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4013122025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Baier, Christel. editor. Caires, Luís. editor. (orcid)0000-0002-3215-6734 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4016042025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Campilho, Aurélio. editor. Karray, Fakhri. editor. (orcid)0000-0002-4217-1372 ter Haar Romeny, Bart. editor. (orcid)0000-0003-3442-3207 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part IIent://SD_ILS/0/SD_ILS:4889562025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890162025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:4850612025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Hameurlain, Abdelkader. editor. Küng, Josef. editor. Wagner, Roland. editor. Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Thoai, Nam. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4874532025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889752025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:5457152025-12-11T12:40:55Z2025-12-11T12:40:55ZAuthor Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>