Search Results for New - Narrowed by: Data encryption (Computer science).SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNew$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2025-12-25T04:03:58ZArtificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4863792025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4863802025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3999042025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971 Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:4005082025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890682025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Meier, Willi. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:4896032025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Shi, Yun Qing. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347552025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Spaces and Next Generation Wired/Wireless Networking 11th International Conference, NEW2AN 2011, and 4th Conference on Smart Spaces, ruSMART 2011, St. Petersburg, Russia, August 22-25, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1951662025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Balandin, Sergey. editor. Koucheryavy, Yevgeni. editor. Hu, Honglin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22875-9">http://dx.doi.org/10.1007/978-3-642-22875-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Towards Trustworthy Elections New Directions in Electronic Votingent://SD_ILS/0/SD_ILS:1921762025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Chaum, David. editor. Jakobsson, Markus. editor. Rivest, Ronald L. editor. Ryan, Peter Y. A. editor. Benaloh, Josh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12980-3">http://dx.doi.org/10.1007/978-3-642-12980-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913082025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papersent://SD_ILS/0/SD_ILS:1908552025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Spaces and Next Generation Wired/Wireless Networking 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1908652025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Balandin, Sergey. editor. Moltchanov, Dmitri. editor. Koucheryavy, Yevgeni. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04190-7">http://dx.doi.org/10.1007/978-3-642-04190-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914272025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Roy, Bimal. editor. Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1886542025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1856472025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1881592025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1834892025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Halevi, Shai. editor. Rabin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1838562025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Yung, Moti. editor. Dodis, Yevgeniy. editor. Kiayias, Aggelos. editor. Malkin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827212025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:1519562025-12-25T04:03:58Z2025-12-25T04:03:58ZAuthor Curtin, Matt. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>