Search Results for Science. - Narrowed by: E-Book - English - Data structures (Computer science). - Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dScience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026te$003dILS$0026ps$003d300?dt=list 2024-08-09T05:37:20Z Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Robustness under Large-Scale Attacks ent://SD_ILS/0/SD_ILS:331604 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Zhou, Qing. author.&#160;Gao, Long. author.&#160;Liu, Ruifang. author.&#160;Cui, Shuguang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331604.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4860-0">http://dx.doi.org/10.1007/978-1-4614-4860-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Optimization 5th International Conference, INOC 2011, Hamburg, Germany, June 13-16, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194729 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Pahl, Julia. editor.&#160;Reiners, Torsten. editor.&#160;Vo&szlig;, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21527-8">http://dx.doi.org/10.1007/978-3-642-21527-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing in Sensor Systems 4th IEEE International Conference, DCOSS 2008 Santorini Island, Greece, June 11-14, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185731 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Nikoletseas, Sotiris E. editor.&#160;Chlebus, Bogdan S. editor.&#160;Johnson, David B. editor.&#160;Krishnamachari, Bhaskar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69170-9">http://dx.doi.org/10.1007/978-3-540-69170-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing in Sensor Systems Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186738 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Aspnes, James. editor.&#160;Scheideler, Christian. editor.&#160;Arora, Anish. editor.&#160;Madden, Samuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73090-3">http://dx.doi.org/10.1007/978-3-540-73090-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing in Sensor Systems Second IEEE International Conference, DCOSS 2006, San Francisco, CA, USA, June 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184223 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Gibbons, Phillip B. editor.&#160;Abdelzaher, Tarek. editor.&#160;Aspnes, James. editor.&#160;Rao, Ramesh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11776178">http://dx.doi.org/10.1007/11776178</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Analysis Methodological Foundations ent://SD_ILS/0/SD_ILS:183027 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Brandes, Ulrik. editor.&#160;Erlebach, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106453">http://dx.doi.org/10.1007/b106453</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing in Sensor Systems First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June 30 &ndash; July 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182818 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Prasanna, Viktor K. editor.&#160;Iyengar, Sitharama S. editor.&#160;Spirakis, Paul G. editor.&#160;Welsh, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137498">http://dx.doi.org/10.1007/b137498</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Preserving Machine Learning for Speech Processing ent://SD_ILS/0/SD_ILS:331555 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Pathak, Manas A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331555.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4639-2">http://dx.doi.org/10.1007/978-1-4614-4639-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation ent://SD_ILS/0/SD_ILS:196819 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Schneider, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30042-4">http://dx.doi.org/10.1007/978-3-642-30042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 &amp; STA 2012 ent://SD_ILS/0/SD_ILS:206735 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Park, Jong Hyuk (James). editor.&#160;Kim, Jongsung. editor.&#160;Zou, Deqing. editor.&#160;Lee, Yang Sun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Video and Audio Broadcasting Technology A Practical Engineering Guide ent://SD_ILS/0/SD_ILS:191739 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Fischer, Walter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11612-4">http://dx.doi.org/10.1007/978-3-642-11612-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Signatures ent://SD_ILS/0/SD_ILS:165432 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Katz, Jonathan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Wireless Communications at the Physical Layer ent://SD_ILS/0/SD_ILS:172230 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Liu, Ruoheng. editor.&#160;Trappe, Wade. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1385-2">http://dx.doi.org/10.1007/978-1-4419-1385-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Engineering ent://SD_ILS/0/SD_ILS:166887 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71817-0">http://dx.doi.org/10.1007/978-0-387-71817-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Emerging Wireless Systems Lower-layer Approaches ent://SD_ILS/0/SD_ILS:167875 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Chen, Yingying. author.&#160;Xu, Wenyuan. author.&#160;Trappe, Wade. author.&#160;Zhang, YanYong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88491-2">http://dx.doi.org/10.1007/978-0-387-88491-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:166640 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Sun, Yan. author.&#160;Trappe, Wade. author.&#160;Liu, K. J. R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theory and Network Coding ent://SD_ILS/0/SD_ILS:167661 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Yeung, Raymond W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-79234-7">http://dx.doi.org/10.1007/978-0-387-79234-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Video and Audio Broadcasting Technology A Practical Engineering Guide ent://SD_ILS/0/SD_ILS:187589 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Fischer, Walter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76358-1">http://dx.doi.org/10.1007/978-3-540-76358-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Algorithms on Reconfigurable Hardware ent://SD_ILS/0/SD_ILS:166167 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. author.&#160;P&eacute;rez, Arturo D&iacute;az. author.&#160;Saqib, Nazar Abbas. author.&#160;Ko&ccedil;, &Ccedil;etin Kaya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36682-1">http://dx.doi.org/10.1007/978-0-387-36682-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Component Models and Systems for Grid Applications Proceedings of the Workshop on Component Models and Systems for Grid Applications held June 26, 2004 in Saint Malo, France. ent://SD_ILS/0/SD_ILS:164906 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Getov, Vladimir. editor.&#160;Kielmann, Thilo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101333">http://dx.doi.org/10.1007/b101333</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:164839 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Zou, Xukai. author.&#160;Ramamurthy, Byrav. author.&#160;Magliveras, Spyros S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms: Design and Applications ent://SD_ILS/0/SD_ILS:164994 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Smith, Sean W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2024-08-09T05:37:20Z 2024-08-09T05:37:20Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>