Search Results for Data Encryption. - Narrowed by: Data mining.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list2024-12-23T12:37:11ZAdvances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4849602024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4831642024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Ishai, Yuval. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4834092024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Cheng, Xiaohui. editor. Jing, Weipeng. editor. Song, Xianhua. editor. Lu, Zeguang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4852852024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Ishai, Yuval. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4861832024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Ishai, Yuval. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4003762024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4006252024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Nielsen, Jesper Buus. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:4006262024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Nielsen, Jesper Buus. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:4006272024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Nielsen, Jesper Buus. editor. Rijmen, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3993472024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Capkun, Srdjan. editor. Chow, Sherman S. M. editor. (orcid)0000-0001-7306-453X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3999042024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971 Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:3998262024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Zelinka, Ivan. editor. Senkerik, Roman. editor. Panda, Ganapati. editor. Lekshmi Kanthan, Padma Suresh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4008302024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Homomorphic Encryption and Applicationsent://SD_ILS/0/SD_ILS:4857612024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Yi, Xun. author. Paulet, Russell. author. Bertino, Elisa. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12229-8">https://doi.org/10.1007/978-3-319-12229-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347672024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334767.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedingsent://SD_ILS/0/SD_ILS:1971012024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Cuppens-Boulahia, Nora. editor. Cuppens, Frédéric. editor. Garcia-Alfaro, Joaquin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31540-4">http://dx.doi.org/10.1007/978-3-642-31540-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Automation International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected Papersent://SD_ILS/0/SD_ILS:1941782024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Qi, Luo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19853-3">http://dx.doi.org/10.1007/978-3-642-19853-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 – February 2, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1955792024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1923872024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Chen, Hsinchun. editor. Chau, Michael. editor. Li, Shu-hsing. editor. Urs, Shalini. editor. Srinivasa, Srinath. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13601-6">http://dx.doi.org/10.1007/978-3-642-13601-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy Enhancing Technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1926842024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Atallah, Mikhail J. editor. Hopper, Nicholas J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14527-8">http://dx.doi.org/10.1007/978-3-642-14527-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1929902024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Chow, Kam-Pui. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15506-2">http://dx.doi.org/10.1007/978-3-642-15506-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems, Technology and Management 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1918682024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Prasad, Sushil K. editor. Vin, Harrick M. editor. Sahni, Sartaj. editor. Jaiswal, Mahadeo P. editor. Thipakorn, Bundit. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12035-0">http://dx.doi.org/10.1007/978-3-642-12035-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Biometric System and Data Analysis Design, Evaluation, and Data Miningent://SD_ILS/0/SD_ILS:1674972024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Dunstone, Ted. editor. Yager, Neil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77627-9">http://dx.doi.org/10.1007/978-0-387-77627-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913082024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems, Technology and Management Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1896732024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Prasad, Sushil K. editor. Routray, Susmi. editor. Khurana, Reema. editor. Sahni, Sartaj. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00405-6">http://dx.doi.org/10.1007/978-3-642-00405-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software and Data Technologies Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1911922024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Cordeiro, José. editor. Shishkov, Boris. editor. Ranchordas, AlpeshKumar. editor. Helfert, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05201-9">http://dx.doi.org/10.1007/978-3-642-05201-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy-Preserving Data Mining Models and Algorithmsent://SD_ILS/0/SD_ILS:1667942024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Aggarwal, Charu C. editor. Yu, Philip S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:1663792024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:1656532024-12-23T12:37:11Z2024-12-23T12:37:11ZAuthor Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>