Search Results for Data Encryption. - Narrowed by: Application software. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Application$002bsoftware.$002509Application$002bsoftware.$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue? 2024-11-12T03:06:09Z Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483128 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:486380 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483889 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486698 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Hao, Feng. editor.&#160;Ruj, Sushmita. editor.&#160;Sen Gupta, Sourav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486706 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Liu, Joseph K. editor. (orcid)0000-0001-6656-6240&#160;Huang, Xinyi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483823 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Thampi, Sabu M. editor.&#160;Madria, Sanjay. editor.&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Rawat, Danda B. editor.&#160;Alcaraz Calero, Jose M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484847 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Askarov, Aslan. editor.&#160;Hansen, Ren&eacute; Rydhof. editor.&#160;Rafnsson, Willard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482982 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Zhang, Huanguo. editor.&#160;Zhao, Bo. editor.&#160;Yan, Fei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applications ent://SD_ILS/0/SD_ILS:483042 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;M&ouml;ller, Dietmar P.F. author.&#160;Haas, Roland E. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Secure Computing A Concise Module ent://SD_ILS/0/SD_ILS:485494 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486060 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2024-11-12T03:06:09Z 2024-11-12T03:06:09Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>