Search Results for Identity. - Narrowed by: Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIdentity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list 2026-04-15T06:56:07Z Identity-Based Encryption ent://SD_ILS/0/SD_ILS:173195 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Chatterjee, Sanjit. author.&#160;Sarkar, Palash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9383-0">http://dx.doi.org/10.1007/978-1-4419-9383-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics in the New World The Cloud, Mobile Technology and Pervasive Identity ent://SD_ILS/0/SD_ILS:488199 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Ashbourn, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04159-9">https://doi.org/10.1007/978-3-319-04159-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193561 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Leeuw, Elisabeth. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Fritsch, Lothar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17303-5">http://dx.doi.org/10.1007/978-3-642-17303-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings ent://SD_ILS/0/SD_ILS:191053 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;J&oslash;sang, Audun. editor.&#160;Maseng, Torleiv. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 ent://SD_ILS/0/SD_ILS:167546 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Leeuw, Elisabeth. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Tseng, Jimmy. editor.&#160;Borking, John. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:165433 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Benantar, Messaoud. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence for Modern Business Systems Emerging Applications and Strategies ent://SD_ILS/0/SD_ILS:601926 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Kautish, Sandeep. editor. (orcid)0000-0001-5120-5741&#160;Chatterjee, Prasenjit. editor. (orcid)0000-0002-7994-4252&#160;Pamucar, Dragan. editor. (orcid)0000-0001-8522-1942&#160;Pradeep, N. editor.&#160;Singh, Deepmala. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5354-7">https://doi.org/10.1007/978-981-99-5354-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613555 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;Singh, Virendra. editor. (orcid)0000-0002-9113-5167&#160;Vaidya, Jaideep. editor. (orcid)0000-0002-7420-6947&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:617853 2026-04-15T06:56:07Z 2026-04-15T06:56:07Z Author&#160;Mayes, Keith. editor.&#160;Markantonakis, Konstantinos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>