Search Results for Data protection. - Narrowed by: Online Library - Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-20T04:09:19ZHarbour Protection Through Data Fusion Technologiesent://SD_ILS/0/SD_ILS:1703632024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Shahbazian, Elisa. editor. Rogova, Galina. editor. DeWeert, Michael J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4020-8883-4">http://dx.doi.org/10.1007/978-1-4020-8883-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3329472024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Das, Sajal K. editor. Nita-Rotaru, Cristina. editor. Kantarcioglu, Murat. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332947.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975002024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Grossklags, Jens. editor. Walrand, Jean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Crittografia nel Paese delle Meraviglieent://SD_ILS/0/SD_ILS:2046512024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959002024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Baras, John S. editor. Katz, Jonathan. editor. Altman, Eitan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25280-8">http://dx.doi.org/10.1007/978-3-642-25280-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935242024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sicherheit und Kryptographie im Internet Von sicherer E-Mail bis zu IP-Verschlüsselungent://SD_ILS/0/SD_ILS:1997742024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Schwenk, Jörg. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9665-0">http://dx.doi.org/10.1007/978-3-8348-9665-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Finite Automata and Application to Cryptographyent://SD_ILS/0/SD_ILS:1880682024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Kryptologie Eine Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.ent://SD_ILS/0/SD_ILS:1997152024-11-20T04:09:19Z2024-11-20T04:09:19ZAuthor Beutelspacher, Albrecht. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9606-3">http://dx.doi.org/10.1007/978-3-8348-9606-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>