Search Results for Security -- Technology. - Narrowed by: Coding theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300?dt=list 2026-04-13T19:25:35Z Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191311 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Kim, Haeng-kon. editor.&#160;Kim, Tai-hoon. editor.&#160;Kiumi, Akingbehin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191494 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;&#346;l&#281;zak, Dominik. editor.&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-Chi. editor.&#160;Arnett, Kirk P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:606898 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks Data Communications, Internet and Security ent://SD_ILS/0/SD_ILS:601853 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Elahi, Ata. author.&#160;Cushman, Alex. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42018-4">https://doi.org/10.1007/978-3-031-42018-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implications of Information and Digital Technologies for Development 18th IFIP WG 9.4 International Conference, ICT4D 2024, Cape Town, South Africa, May 20-22, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604555 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Chigona, Wallace. editor. (orcid)0000-0002-1059-811X&#160;Kabanda, Salah. editor. (orcid)0000-0002-0490-8417&#160;Seymour, Lisa F. editor. (orcid)0000-0001-6704-0021&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66982-8">https://doi.org/10.1007/978-3-031-66982-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implications of Information and Digital Technologies for Development 18th IFIP WG 9.4 International Conference, ICT4D 2024, Cape Town, South Africa, May 20-22, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604556 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Chigona, Wallace. editor. (orcid)0000-0002-1059-811X&#160;Kabanda, Salah. editor. (orcid)0000-0002-0490-8417&#160;Seymour, Lisa F. editor. (orcid)0000-0001-6704-0021&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66986-6">https://doi.org/10.1007/978-3-031-66986-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617874 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Fahrnberger, G&uuml;nter. editor. (orcid)0000-0002-2606-3988&#160;Eichler, Gerald. editor.&#160;Erfurth, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Computing Application and Wireless Sensor UCAWSN-14 ent://SD_ILS/0/SD_ILS:530612 2026-04-13T19:25:35Z 2026-04-13T19:25:35Z Author&#160;Park, James J. (Jong Hyuk). editor.&#160;Pan, Yi. editor.&#160;Chao, Han-Chieh. editor.&#160;Yi, Gangman. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-017-9618-7">https://doi.org/10.1007/978-94-017-9618-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>