Search Results for Computer science. - Narrowed by: English - Online Library - Data encryption (Computer science). - Optical pattern recognition. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Optical$002bpattern$002brecognition.$002509Optical$002bpattern$002brecognition.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-15T08:04:02Z Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security ent://SD_ILS/0/SD_ILS:197164 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Shi, Yun Q. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VII ent://SD_ILS/0/SD_ILS:196512 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VI ent://SD_ILS/0/SD_ILS:195673 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Shi, Yun Q. editor.&#160;Emmanuel, Sabu. editor.&#160;Kankanhalli, Mohan S. editor.&#160;Chang, Shih-Fu. editor.&#160;Radhakrishnan, Regunathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24556-5">http://dx.doi.org/10.1007/978-3-642-24556-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security V ent://SD_ILS/0/SD_ILS:192607 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14298-7">http://dx.doi.org/10.1007/978-3-642-14298-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration ent://SD_ILS/0/SD_ILS:190185 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Cortier, V&eacute;ronique. editor.&#160;Kirchner, Claude. editor.&#160;Okada, Mitsuhiro. editor.&#160;Sakurada, Hideki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:164923 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Robinson, Philip. editor.&#160;Vogt, Harald. editor.&#160;Wagealla, Waleed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:167461 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author.&#160;Nandakumar, Karthik. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77326-1">http://dx.doi.org/10.1007/978-0-387-77326-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Privacy in Video Surveillance ent://SD_ILS/0/SD_ILS:175945 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Senior, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84882-301-3">http://dx.doi.org/10.1007/978-1-84882-301-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:167010 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73003-5">http://dx.doi.org/10.1007/978-0-387-73003-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190284 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Sorell, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02312-5">http://dx.doi.org/10.1007/978-3-642-02312-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Biometrics ent://SD_ILS/0/SD_ILS:166799 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Jain, Anil K. editor.&#160;Flynn, Patrick. editor.&#160;Ross, Arun A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliable Face Recognition Methods System Design, Impementation and Evaluation ent://SD_ILS/0/SD_ILS:166247 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Wechsler, Harry. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:165418 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Axelsson, Stefan. author.&#160;Sands, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:165467 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Vielhauer, Claus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unconstrained Face Recognition ent://SD_ILS/0/SD_ILS:165650 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Zhou, Shaohua Kevin. author.&#160;Chellappa, Rama. author.&#160;Zhao, Wenyi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Multibiometrics ent://SD_ILS/0/SD_ILS:165914 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Ross, Arun A. author.&#160;Jain, Anil K. author.&#160;Nandakumar, Karthik. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2024-07-15T08:04:02Z 2024-07-15T08:04:02Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>