Search Results for Learning -- Research. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLearning$002b--$002bResearch.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-21T07:17:55Z Cyber Security, Cryptology, and Machine Learning 8th International Symposium, CSCML 2024, Be'er Sheva, Israel, December 19-20, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606571 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Dolev, Shlomi. editor. (orcid)0000-0001-5418-6670&#160;Elhadad, Michael. editor. (orcid)0000-0002-5629-2351&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;Persiano, Giuseppe. editor. (orcid)0000-0001-6579-4807&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76934-4">https://doi.org/10.1007/978-3-031-76934-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023 ent://SD_ILS/0/SD_ILS:603303 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Chaturvedi, Atul. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;Roy, Bimal Kumar. editor.&#160;Tsaban, Boaz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022 ent://SD_ILS/0/SD_ILS:601864 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Roy, Bimal Kumar. editor.&#160;Chaturvedi, Atul. editor.&#160;Tsaban, Boaz. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications ent://SD_ILS/0/SD_ILS:615552 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Palomares Carrascosa, Iv&aacute;n. editor.&#160;Kalutarage, Harsha Kumara. editor.&#160;Huang, Yan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:616045 2026-03-21T07:17:55Z 2026-03-21T07:17:55Z Author&#160;Liu, Peng. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>