Search Results for Communication - Narrowed by: Computer science. - Data encryption (Computer science). - Data mining. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCommunication$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-07-18T18:30:25Z Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 &ndash; February 2, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195579 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192990 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Chow, Kam-Pui. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15506-2">http://dx.doi.org/10.1007/978-3-642-15506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484960 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings ent://SD_ILS/0/SD_ILS:197101 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31540-4">http://dx.doi.org/10.1007/978-3-642-31540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Automation International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194178 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19853-3">http://dx.doi.org/10.1007/978-3-642-19853-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192387 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Chen, Hsinchun. editor.&#160;Chau, Michael. editor.&#160;Li, Shu-hsing. editor.&#160;Urs, Shalini. editor.&#160;Srinivasa, Srinath. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13601-6">http://dx.doi.org/10.1007/978-3-642-13601-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192684 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Atallah, Mikhail J. editor.&#160;Hopper, Nicholas J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14527-8">http://dx.doi.org/10.1007/978-3-642-14527-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:165653 2024-07-18T18:30:25Z 2024-07-18T18:30:25Z Author&#160;Vaidya, Jaideep. author.&#160;Zhu, Yu Michael. author.&#160;Clifton, Christopher W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>