Arama Sonu&ccedil;lar&#305; China. - Daralt&#305;lm&#305;&#351;: Information Systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dChina.$0026qf$003dSUBJECT$002509Konu$002509Information$002bSystems.$002509Information$002bSystems.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-06T02:01:14Z Cybersecurity in China The Next Wave ent://SD_ILS/0/SD_ILS:399174 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Austin, Greg. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-68436-9">https://doi.org/10.1007/978-3-319-68436-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The China Information Technology Handbook ent://SD_ILS/0/SD_ILS:167517 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Ord&oacute;&ntilde;ez de Pablos, Patricia. editor.&#160;Lytras, Miltiadis D. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77743-6">http://dx.doi.org/10.1007/978-0-387-77743-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334519.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Third Joint International Conference, FAW-AAIM 2013, Dalian, China, June 26-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334663 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Fellows, Michael. editor.&#160;Tan, Xuehou. editor.&#160;Zhu, Binhai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334663.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38756-2">http://dx.doi.org/10.1007/978-3-642-38756-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335225 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Su, Jinshu. editor.&#160;Zhao, Baokang. editor.&#160;Sun, Zhigang. editor.&#160;Wang, Xiaofeng. editor.&#160;Wang, Fei. editor.<br/>Yer Numaras&#305;&#160;ONLINE(335225.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Evaluation of Novel Approaches to Software Engineering 6th International Conference, ENASE 2011, Beijing, China, June 8-11, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:333558 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Maciaszek, Leszek A. editor.&#160;Zhang, Kang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(333558.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32341-6">http://dx.doi.org/10.1007/978-3-642-32341-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197559 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Wang, Xiaoyun. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Communications and Applications First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196629 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;S&eacute;nac, Patrick. editor.&#160;Ott, Max. editor.&#160;Seneviratne, Aruna. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29157-9">http://dx.doi.org/10.1007/978-3-642-29157-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197529 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Xu, Li. editor.&#160;Bertino, Elisa. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34601-9">http://dx.doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Web Information Systems and Mining International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197381 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Wang, Fu Lee. editor.&#160;Lei, Jingsheng. editor.&#160;Gong, Zhiguo. editor.&#160;Luo, Xiangfeng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33469-6">http://dx.doi.org/10.1007/978-3-642-33469-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Joint International Conference, FAW-AAIM 2012, Beijing, China, May 14-16, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196751 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Snoeyink, Jack. editor.&#160;Lu, Pinyan. editor.&#160;Su, Kaile. editor.&#160;Wang, Lusheng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29700-7">http://dx.doi.org/10.1007/978-3-642-29700-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Internet 6th International ICST Conference, WICON 2011, Xi&rsquo;an, China, October 19-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196900 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Ren, Pinyi. editor.&#160;Zhang, Chao. editor.&#160;Liu, Xin. editor.&#160;Liu, Pei. editor.&#160;Ci, Song. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30493-4">http://dx.doi.org/10.1007/978-3-642-30493-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Service-Oriented Computing 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197506 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Liu, Chengfei. editor.&#160;Ludwig, Heiko. editor.&#160;Toumani, Farouk. editor.&#160;Yu, Qi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34321-6">http://dx.doi.org/10.1007/978-3-642-34321-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Contemporary Research on E-business Technology and Strategy International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197518 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Khachidze, Vasil. editor.&#160;Wang, Tim. editor.&#160;Siddiqui, Sohail. editor.&#160;Liu, Vincent. editor.&#160;Cappuccio, Sergio. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34447-3">http://dx.doi.org/10.1007/978-3-642-34447-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Forensics in Telecommunications, Information, and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195389 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Lai, Xuejia. editor.&#160;Gu, Dawu. editor.&#160;Jin, Bo. editor.&#160;Wang, Yongquan. editor.&#160;Li, Hui. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23602-0">http://dx.doi.org/10.1007/978-3-642-23602-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195901 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Provable Security 5th International Conference, ProvSec 2011, Xi&rsquo;an, China, October 16-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195600 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Boyen, Xavier. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193265 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Bao, Feng. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Jing, Jiwu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 &ndash; June 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194568 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Bao, Feng. editor.&#160;Weng, Jian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Joint International Conference, FAW-AAIM 2011, Jinhua, China, May 28-31, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194626 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Atallah, Mikhail. editor.&#160;Li, Xiang-Yang. editor.&#160;Zhu, Binhai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21204-8">http://dx.doi.org/10.1007/978-3-642-21204-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Algorithmic Aspects in Information and Management 6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192625 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Chen, Bo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14355-7">http://dx.doi.org/10.1007/978-3-642-14355-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192708 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189996 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Yung, Moti. editor.&#160;Liu, Peng. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Networks for Grid Applications Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190209 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Vicat-Blanc Primet, Pascale. editor.&#160;Kudoh, Tomohiro. editor.&#160;Mambretti, Joe. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02080-3">http://dx.doi.org/10.1007/978-3-642-02080-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:188456 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Pei, Dingyi. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Wu, Chuankun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189304 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Franklin, Matthew K. editor.&#160;Hui, Lucas Chi Kwong. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185341 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Mei, Hong. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:187139 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Wang, Yuping. editor.&#160;Cheung, Yiu-ming. editor.&#160;Liu, Hailin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186340 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186461 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Dawson, Ed. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187773 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Qing, Sihan. editor.&#160;Imai, Hideki. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183605 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Chen, Kefei. editor.&#160;Deng, Robert. editor.&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185207 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Pointcheval, David. editor.&#160;Mu, Yi. editor.&#160;Chen, Kefei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185214 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Lai, Xuejia. editor.&#160;Chen, Kefei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185235 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Lipmaa, Helger. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings Part I ent://SD_ILS/0/SD_ILS:182770 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Hao, Yue. editor.&#160;Liu, Jiming. editor.&#160;Wang, Yuping. editor.&#160;Cheung, Yiu-ming. editor.&#160;Yin, Hujun. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183162 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Qing, Sihan. editor.&#160;Mao, Wenbo. editor.&#160;L&oacute;pez, Javier. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183283 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Desmedt, Yvo G. editor.&#160;Wang, Huaxiong. editor.&#160;Mu, Yi. editor.&#160;Li, Yongqing. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183366 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Feng, Dengguo. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> QoS Management of Web Services ent://SD_ILS/0/SD_ILS:333814 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Zheng, Zibin. author.&#160;Lyu, Michael R. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(333814.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34207-3">http://dx.doi.org/10.1007/978-3-642-34207-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dynamic Provisioning for Community Services ent://SD_ILS/0/SD_ILS:333856 2025-12-06T02:01:14Z 2025-12-06T02:01:14Z Yazar&#160;Qi, Li. author.&#160;Jin, Hai. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(333856.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34513-5">http://dx.doi.org/10.1007/978-3-642-34513-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>