Search Results for Security. - Narrowed by: Biometrics (Biology).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Biometrics$002b$002528Biology$002529.$002509Biometrics$002b$002528Biology$002529.$0026ps$003d300$0026isd$003dtrue?
2024-11-07T21:29:14Z
Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487487
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author De Decker, Bart. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Medical Imaging and its Security in Telemedicine Applications
ent://SD_ILS/0/SD_ILS:487428
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Thanki, Rohit. author. (orcid)0000-0002-0645-6266 Borra, Surekha. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485714
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Bernsmed, Karin. editor. Fischer-Hübner, Simone. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Touchless Palmprint Recognition Systems
ent://SD_ILS/0/SD_ILS:488861
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Genovese, Angelo. author. Piuri, Vincenzo. author. Scotti, Fabio. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics
ent://SD_ILS/0/SD_ILS:483963
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Speech Enhancement Techniques for Digital Hearing Aids
ent://SD_ILS/0/SD_ILS:482802
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Borisagar, Komal R. author. Thanki, Rohit M. author. (orcid)0000-0002-0645-6266 Sedani, Bhavin S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric Recognition 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12–13, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486068
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Sun, Zhenan. editor. He, Ran. editor. Feng, Jianjiang. editor. Shan, Shiguang. editor. Guo, Zhenhua. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31456-9">https://doi.org/10.1007/978-3-030-31456-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fundamentals of Sketch-Based Passwords A General Framework
ent://SD_ILS/0/SD_ILS:487393
2024-11-07T21:29:14Z
2024-11-07T21:29:14Z
Author Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>