Search Results for Computer science. - Narrowed by: Jajodia, Sushil. editor. - SpringerLink (Online service) - Data Encryption. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dAUTHOR$002509Author$002509Jajodia$00252C$002bSushil.$002beditor.$002509Jajodia$00252C$002bSushil.$002beditor.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T16:44:53Z Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-09-10T16:44:53Z 2024-09-10T16:44:53Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-09-10T16:44:53Z 2024-09-10T16:44:53Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>