Search Results for Data structures (Computer science) - Narrowed by: Security Services. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Security$002bServices.$002509Security$002bServices.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-20T17:42:28Z Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:606350 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608986 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95764-2">https://doi.org/10.1007/978-3-031-95764-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606243 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609005 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95767-3">https://doi.org/10.1007/978-3-031-95767-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609039 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95761-1">https://doi.org/10.1007/978-3-031-95761-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing and Informatics 9th International Conference, ICOCI 2023, Kuala Lumpur, Malaysia, September 13-14, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602421 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Zakaria, Nur Haryani. editor.&#160;Mansor, Nur Suhaili. editor.&#160;Husni, Husniza. editor.&#160;Mohammed, Fathey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9589-9">https://doi.org/10.1007/978-981-99-9589-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing and Informatics 9th International Conference, ICOCI 2023, Kuala Lumpur, Malaysia, September 13-14, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602422 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;Zakaria, Nur Haryani. editor.&#160;Mansor, Nur Suhaili. editor.&#160;Husni, Husniza. editor.&#160;Mohammed, Fathey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9592-9">https://doi.org/10.1007/978-981-99-9592-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602721 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54773-7">https://doi.org/10.1007/978-3-031-54773-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602730 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54776-8">https://doi.org/10.1007/978-3-031-54776-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602753 2026-03-20T17:42:28Z 2026-03-20T17:42:28Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54770-6">https://doi.org/10.1007/978-3-031-54770-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>