Search Results for Computer networks. - Narrowed by: Biometrics. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Biometrics.$002509Biometrics.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-11-11T18:08:56Z Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399665 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Saracino, Andrea. editor.&#160;Mori, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:401736 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400212 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Zhou, Jie. editor.&#160;Wang, Yunhong. editor.&#160;Sun, Zhenan. editor.&#160;Jia, Zhenhong. editor.&#160;Feng, Jianjiang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety and Sustainability &amp; e-Democracy 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197375 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Georgiadis, Christos K. editor.&#160;Jahankhani, Hamid. editor.&#160;Pimenidis, Elias. editor.&#160;Bashroush, Rabih. editor.&#160;Al-Nemrat, Ameer. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33448-1">http://dx.doi.org/10.1007/978-3-642-33448-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Financial and Medical Identity Theft ent://SD_ILS/0/SD_ILS:174049 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Camp, L. Jean. author.&#160;Johnson, M. Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agents and Peer-to-Peer Computing 7th International Workshop, AP2PC 2008, Estoril, Portugal, May 13, 2008 and 8th International Workshop, AP2PC 2009, Budapest, Hungary, May 11, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197140 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Beneventano, Domenico. editor.&#160;Despotovic, Zoran. editor.&#160;Guerra, Francesco. editor.&#160;Joseph, Sam. editor.&#160;Moro, Gianluca. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31809-2">http://dx.doi.org/10.1007/978-3-642-31809-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197280 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Decker, Bart. editor.&#160;Chadwick, David W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193686 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Jha, Somesh. editor.&#160;Mathuria, Anish. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191714 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Weerasinghe, Dasun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191716 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Goel, Sanjay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11534-9">http://dx.doi.org/10.1007/978-3-642-11534-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web Service Mining Application to Discoveries of Biological Pathways ent://SD_ILS/0/SD_ILS:172623 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Zheng, George. author.&#160;Bouguettaya, Athman. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6539-4">http://dx.doi.org/10.1007/978-1-4419-6539-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Intelligence and Computing 7th International Conference, UIC 2010, Xi&rsquo;an, China, October 26-29, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193269 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Yu, Zhiwen. editor.&#160;Liscano, Ramiro. editor.&#160;Chen, Guanling. editor.&#160;Zhang, Daqing. editor.&#160;Zhou, Xingshe. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16355-5">http://dx.doi.org/10.1007/978-3-642-16355-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190920 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Kirda, Engin. editor.&#160;Jha, Somesh. editor.&#160;Balzarotti, Davide. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04342-0">http://dx.doi.org/10.1007/978-3-642-04342-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191472 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Prakash, Atul. editor.&#160;Sen Gupta, Indranil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimodal Processing and Interaction Audio, Video, Text ent://SD_ILS/0/SD_ILS:167324 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Maragos, Petros. editor.&#160;Potamianos, Alexandros. editor.&#160;Gros, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-76316-3">http://dx.doi.org/10.1007/978-0-387-76316-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189347 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Sekar, R. editor.&#160;Pujari, Arun K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Identity Theft: Avoidance, Causes and Possible Cures ent://SD_ILS/0/SD_ILS:166606 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Camp, L. Jean. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequence Data Mining ent://SD_ILS/0/SD_ILS:166747 2024-11-11T18:08:56Z 2024-11-11T18:08:56Z Author&#160;Dong, Guozhu. author.&#160;Pei, Jian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-69937-0">http://dx.doi.org/10.1007/978-0-387-69937-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>