Search Results for Data protection. - Narrowed by: 2010 - Information Systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300$0026isd$003dtrue? 2024-09-04T07:29:41Z Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192544 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Steinfeld, Ron. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193245 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Heng, Swee-Huay. editor.&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193582 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Abe, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192004 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12459-4">http://dx.doi.org/10.1007/978-3-642-12459-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Application 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192017 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Gollmann, Dieter. editor.&#160;Lanet, Jean-Louis. editor.&#160;Iguchi-Cartigny, Julien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12510-2">http://dx.doi.org/10.1007/978-3-642-12510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192074 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Bernstein, Daniel J. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12678-9">http://dx.doi.org/10.1007/978-3-642-12678-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192123 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Kwak, Jin. editor.&#160;Deng, Robert H. editor.&#160;Won, Yoojae. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 &ndash; June 3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192256 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Gilbert, Henri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13190-5">http://dx.doi.org/10.1007/978-3-642-13190-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192472 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Hong, Seokhie. editor.&#160;Iwata, Tetsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13858-4">http://dx.doi.org/10.1007/978-3-642-13858-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193160 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Dolev, Shlomi. editor.&#160;Cobb, Jorge. editor.&#160;Fischer, Michael. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16023-3">http://dx.doi.org/10.1007/978-3-642-16023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193421 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Ors Yalcin, Siddika Berna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193590 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Gong, Guang. editor.&#160;Gupta, Kishan Chand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17401-8">http://dx.doi.org/10.1007/978-3-642-17401-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193524 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Alpcan, Tansu. editor.&#160;Butty&aacute;n, Levente. editor.&#160;Baras, John S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192508 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Aagesen, Finn Arve. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13971-0">http://dx.doi.org/10.1007/978-3-642-13971-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192673 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192708 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2010 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192716 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14623-7">http://dx.doi.org/10.1007/978-3-642-14623-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193296 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Martinelli, Fabio. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16441-5">http://dx.doi.org/10.1007/978-3-642-16441-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Security Management IT Securiteers - Setting up an IT Security Function ent://SD_ILS/0/SD_ILS:205344 2024-09-04T07:29:41Z 2024-09-04T07:29:41Z Author&#160;Partida, Alberto. author.&#160;Andina, Diego. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>