Arama Sonuçları Data encryption (Computer science). - Daraltılmış: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092005$0025092005$0026ps$003d300?dt=list2024-11-22T11:45:41ZIntrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:1649192024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communicationent://SD_ILS/0/SD_ILS:1649202024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:1649232024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computing Platforms: Design and Applicationsent://SD_ILS/0/SD_ILS:1649942024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Smith, Sean W. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650012024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1650112024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:1650552024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:1652242024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Weippl, Edgar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia Encryption and Watermarkingent://SD_ILS/0/SD_ILS:1652262024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), October 28–30, 2005, Poznan, Polandent://SD_ILS/0/SD_ILS:1656722024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Funabashi, Matohisa. editor. Grzech, Adam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:1688832024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypots for Windowsent://SD_ILS/0/SD_ILS:1707122024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Grimes, Roger A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4302-0007-9">http://dx.doi.org/10.1007/978-1-4302-0007-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Complexity Theory and Cryptology An Introduction to Cryptocomplexityent://SD_ILS/0/SD_ILS:1817822024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Rothe, Jörg. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827212024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1827572024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Chadwick, David. editor. Zhao, Gansen. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1827822024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Molva, Refik. editor. Tsudik, Gene. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827982024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Julisch, Klaus. editor. Kruegel, Christopher. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1828162024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Gilbert, Henri. editor. Handschuh, Helena. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:1828272024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Patrick, Andrew S. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828302024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Boyd, Colin. editor. González Nieto, Juan Manuel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828892024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Katsikas, Sokratis. editor. López, Javier. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830032024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Zhou, Jianying. editor. Lopez, Javier. editor. Deng, Robert H. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830102024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Jajodia, Sushil. editor. Wijesekera, Duminda. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:1830322024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Martin, David. editor. Serjantov, Andrei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830452024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830492024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Dittmann, Jana. editor. Katzenbeisser, Stefan. editor. Uhl, Andreas. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830502024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Deng, Robert H. editor. Bao, Feng. editor. Pang, HweeHwa. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830522024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830662024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:1815402024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Manin, Yuri Ivanovic. author. Panchishkin, Alexei A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833602024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Smart, Nigel P. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833642024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833662024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Feng, Dengguo. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1826662024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Barni, Mauro. editor. Herrera-Joancomartí, Jordi. editor. Katzenbeisser, Stefan. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1828922024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Cox, Ingemar J. editor. Kalker, Ton. editor. Lee, Heung-Kyu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829022024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Lim, Chae Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829222024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Encryption Standard – AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papersent://SD_ILS/0/SD_ILS:1829262024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Dobbertin, Hans. editor. Rijmen, Vincent. editor. Sowa, Aleksandra. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137765">http://dx.doi.org/10.1007/b137765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1829562024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Shoup, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Roy, Bimal. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Embedded and Ubiquitous Computing – EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832812024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Enokido, Tomoya. editor. Yan, Lu. editor. Xiao, Bin. editor. Kim, Daeyoung. editor. Dai, Yuanshun. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elektronik imza ve uygulamasıent://SD_ILS/0/SD_ILS:1319682024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Orta, Mesut.<br/>Yer Numarası KKX872.5 .O78 2005<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:1519562024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Curtin, Matt. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Group Communications over Data Networksent://SD_ILS/0/SD_ILS:1648392024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Zou, Xukai. author. Ramamurthy, Byrav. author. Magliveras, Spyros S. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:1649772024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Salomon, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:1650862024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:1763422024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Filiol, Eric. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1822622024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Fridrich, Jessica. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823282024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Castelluccia, Claude. editor. Hartenstein, Hannes. editor. Paar, Christof. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedingsent://SD_ILS/0/SD_ILS:1823322024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Maher, Michael J. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b103476">http://dx.doi.org/10.1007/b103476</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedingsent://SD_ILS/0/SD_ILS:1823562024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Canteaut, Anne. editor. Viswanathan, Kapaleeswaran. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823612024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Handschuh, Helena. editor. Hasan, M. Anwar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Topics in Cryptology – CT-RSA 2005 The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1823712024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Menezes, Alfred. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1823732024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Kilian, Joe. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1823772024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823942024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Blundo, Carlo. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:1830092024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Aldini, Alessandro. editor. Gorrieri, Roberto. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:1831132024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Helleseth, Tor. editor. Sarwate, Dilip. editor. Song, Hong-Yeop. editor. Yang, Kyeongcheol. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831172024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Barni, Mauro. editor. Cox, Ingemar. editor. Kalker, Ton. editor. Kim, Hyoung-Joong. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831202024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Cramer, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831302024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Dawson, Ed. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptographic Hardware and Embedded Systems – CHES 2005 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830132024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Rao, Josyula R. editor. Sunar, Berk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831622024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Qing, Sihan. editor. Mao, Wenbo. editor. López, Javier. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832632024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Jia, Xiaohua. editor. Wu, Jie. editor. He, Yanxiang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832652024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Maitra, Subhamoy. editor. Veni Madhavan, C. E. editor. Venkatesan, Ramarathnam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832832024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Desmedt, Yvo G. editor. Wang, Huaxiong. editor. Mu, Yi. editor. Li, Yongqing. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:2848652024-11-22T11:45:41Z2024-11-22T11:45:41ZYazar Mollin, Richard A., 1947-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>