Search Results for Information Systems. - Narrowed by: 2013 - Computer science. - Computers and Society. - Data Encryption. - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bSystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-08-13T21:58:40Z Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334755 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Janczewski, Lech J. editor.&#160;Wolfe, Henry B. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334755.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334696 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Huth, Michael. editor.&#160;Asokan, N. editor.&#160;&#268;apkun, Srdjan. editor.&#160;Flechais, Ivan. editor.&#160;Coles-Kemp, Lizzie. editor.<br/>Preferred Shelf Number&#160;ONLINE(334696.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335077.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:331112 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331112.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-08-13T21:58:40Z 2024-08-13T21:58:40Z Author&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334301.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>