Search Results for Cooperating objects (Computer systems) - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCooperating$002bobjects$002b$002528Computer$002bsystems$002529$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-25T06:16:26Z Attacks and Defenses for the Internet-of-Things 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607638 2026-03-25T06:16:26Z 2026-03-25T06:16:26Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;Shao, Jun. editor. (orcid)0000-0001-8352-0973&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85593-1">https://doi.org/10.1007/978-3-031-85593-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Embedded Systems Security ent://SD_ILS/0/SD_ILS:604651 2026-03-25T06:16:26Z 2026-03-25T06:16:26Z Author&#160;Hou, Xiaolu. author.&#160;Breier, Jakub. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62205-2">https://doi.org/10.1007/978-3-031-62205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-03-25T06:16:26Z 2026-03-25T06:16:26Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>