Search Results for Data science. - Narrowed by: Biometrics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Biometrics.$002509Biometrics.$0026ps$003d300$0026isd$003dtrue?2024-11-16T00:34:45ZFundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:4017362024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Biometricsent://SD_ILS/0/SD_ILS:3311772024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Campisi, Patrizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331177.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile Authentication Problems and Solutionsent://SD_ILS/0/SD_ILS:3316102024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343992024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Fischer-Hübner, Simone. editor. Leeuw, Elisabeth. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334399.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350022024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Decker, Bart. editor. Dittmann, Jana. editor. Kraetzer, Christian. editor. Vielhauer, Claus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335002.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data Mining Applications Using Artificial Adaptive Systemsent://SD_ILS/0/SD_ILS:3314532024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Tastle, William J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331453.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4223-3">http://dx.doi.org/10.1007/978-1-4614-4223-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972802024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Decker, Bart. editor. Chadwick, David W. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Securityent://SD_ILS/0/SD_ILS:1971642024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Shi, Yun Q. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Economics of Financial and Medical Identity Theftent://SD_ILS/0/SD_ILS:1740492024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Camp, L. Jean. author. Johnson, M. Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936862024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1917142024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Policies and Research in Identity Management Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935612024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Leeuw, Elisabeth. editor. Fischer-Hübner, Simone. editor. Fritsch, Lothar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17303-5">http://dx.doi.org/10.1007/978-3-642-17303-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:1670102024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Li, Stan Z. editor. Jain, Anil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73003-5">http://dx.doi.org/10.1007/978-0-387-73003-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Biometric System and Data Analysis Design, Evaluation, and Data Miningent://SD_ILS/0/SD_ILS:1674972024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Dunstone, Ted. editor. Yager, Neil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77627-9">http://dx.doi.org/10.1007/978-0-387-77627-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1902842024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Sorell, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02312-5">http://dx.doi.org/10.1007/978-3-642-02312-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaborationent://SD_ILS/0/SD_ILS:1901852024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Cortier, Véronique. editor. Kirchner, Claude. editor. Okada, Mitsuhiro. editor. Sakurada, Hideki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1908232024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Jahankhani, Hamid. editor. Hessami, Ali G. editor. Hsu, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913082024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Contemporary Computing Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1906562024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Ranka, Sanjay. editor. Aluru, Srinivas. editor. Buyya, Rajkumar. editor. Chung, Yeh-Ching. editor. Dua, Sumeet. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03547-0">http://dx.doi.org/10.1007/978-3-642-03547-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Recent Advances in Intrusion Detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909202024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Kirda, Engin. editor. Jha, Somesh. editor. Balzarotti, Davide. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04342-0">http://dx.doi.org/10.1007/978-3-642-04342-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1914722024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Prakash, Atul. editor. Sen Gupta, Indranil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:1675462024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Leeuw, Elisabeth. editor. Fischer-Hübner, Simone. editor. Tseng, Jimmy. editor. Borking, John. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1893472024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Sekar, R. editor. Pujari, Arun K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing Biometrics Applicationsent://SD_ILS/0/SD_ILS:1667452024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Shoniregun, Charles A. author. Crosier, Stephen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeitingent://SD_ILS/0/SD_ILS:1756572024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Tuyls, Pim. editor. Skoric, Boris. editor. Kevenaar, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:1666062024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Camp, L. Jean. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Identification Based on Gaitent://SD_ILS/0/SD_ILS:1656522024-11-16T00:34:45Z2024-11-16T00:34:45ZAuthor Nixon, Mark S. author. Tan, Tieniu. author. Chellappa, Rama. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>