Search Results for Computer science. - Narrowed by: Computers -- Law and legislation. - Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bLaw$002band$002blegislation.$002509Computers$002b--$002bLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2024-09-24T03:54:59Z
Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria
ent://SD_ILS/0/SD_ILS:401736
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334145
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Christianson, Bruce. editor. Malcolm, James A. editor. Matyáš, Vashek. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334145.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194926
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Christianson, Bruce. editor. Malcolm, James A. editor. Matyas, Vashek. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22137-8">http://dx.doi.org/10.1007/978-3-642-22137-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191613
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Garcia-Alfaro, Joaquin. editor. Navarro-Arribas, Guillermo. editor. Cuppens-Boulahia, Nora. editor. Roudier, Yves. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191308
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190946
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Katzenbeisser, Stefan. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187473
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Susilo, Willy. editor. Liu, Joseph K. editor. Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:184331
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Safavi-Naini, Reihaneh. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400077
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Castiglione, Arcangelo. editor. Pop, Florin. editor. Ficco, Massimo. editor. Palmieri, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400334
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:402675
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Kerschbaum, Florian. editor. Paraboschi, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399426
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Gruschka, Nils. editor. (orcid)0000-0001-7360-8314 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399699
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399718
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400566
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Biometrics
ent://SD_ILS/0/SD_ILS:331177
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Campisi, Patrizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331177.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Identity Management for Life
ent://SD_ILS/0/SD_ILS:194330
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Camenisch, Jan. editor. Fischer-Hübner, Simone. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20317-6">http://dx.doi.org/10.1007/978-3-642-20317-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 – February 2, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195579
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192990
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Chow, Kam-Pui. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15506-2">http://dx.doi.org/10.1007/978-3-642-15506-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190588
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Matyáš, Vashek. editor. Fischer-Hübner, Simone. editor. Cvrček, Daniel. editor. Švenda, Petr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190284
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Sorell, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02312-5">http://dx.doi.org/10.1007/978-3-642-02312-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance Security in the Information Environment
ent://SD_ILS/0/SD_ILS:175440
2024-09-24T03:54:59Z
2024-09-24T03:54:59Z
Author Blyth, Andrew. author. Kovacich, Gerald L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>