Arama Sonu&ccedil;lar&#305; Data protection. - Daralt&#305;lm&#305;&#351;: Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Telecommunication.$002509Telecommunication.$0026ps$003d300$0026isd$003dtrue? 2024-12-01T12:26:53Z Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401013 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Zhou, Yifeng. editor.&#160;Kunz, Thomas. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:401109 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402381 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Chen, Yuanfang. editor.&#160;Duong, Trung Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:399066 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Lin, Xiaodong. author.&#160;Ni, Jianbing. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Edge Computing: A Primer ent://SD_ILS/0/SD_ILS:400196 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Cao, Jie. author.&#160;Zhang, Quan. author.&#160;Shi, Weisong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adversary Detection For Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:401405 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;ONLINE(331766.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331785.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332050.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332220.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332451.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331279.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332461.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332468.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332479.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:332861 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Taha, Sanaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332861.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334140.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334292.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:173990 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 &amp; STA 2012 ent://SD_ILS/0/SD_ILS:206735 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Park, Jong Hyuk (James). editor.&#160;Kim, Jongsung. editor.&#160;Zou, Deqing. editor.&#160;Lee, Yang Sun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of the International Conference on IT Convergence and Security 2011 ent://SD_ILS/0/SD_ILS:206494 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Kim, Kuinam J. editor.&#160;Ahn, Seong Jin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:198973 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Spitz, Stephan. author.&#160;Pramateftakis, Michael. author.&#160;Swoboda, Joachim. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8120-5">http://dx.doi.org/10.1007/978-3-8348-8120-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trustworthy Internet ent://SD_ILS/0/SD_ILS:204521 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Salgarelli, Luca. editor.&#160;Bianchi, Giuseppe. editor.&#160;Blefari-Melazzi, Nicola. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1818-1">http://dx.doi.org/10.1007/978-88-470-1818-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT Security Management IT Securiteers - Setting up an IT Security Function ent://SD_ILS/0/SD_ILS:205344 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Partida, Alberto. author.&#160;Andina, Diego. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190222 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Berg, Hans. editor.&#160;Heijenk, Geert. editor.&#160;Osipov, Evgeny. editor.&#160;Staehle, Dirk. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02118-3">http://dx.doi.org/10.1007/978-3-642-02118-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185594 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Harju, Jarmo. editor.&#160;Heijenk, Geert. editor.&#160;Langend&ouml;rfer, Peter. editor.&#160;Siris, Vasilios A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189281 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Vaz&atilde;o, Teresa. editor.&#160;Freire, M&aacute;rio M. editor.&#160;Chong, Ilyoung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89524-4">http://dx.doi.org/10.1007/978-3-540-89524-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:199590 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Swoboda, Joachim. author.&#160;Spitz, Stephan. author.&#160;Pramateftakis, Michael. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9473-1">http://dx.doi.org/10.1007/978-3-8348-9473-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:184773 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Chakrabarti, Anirban. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186625 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Boavida, Fernando. editor.&#160;Monteiro, Edmundo. editor.&#160;Mascolo, Saverio. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187766 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Zhang, Hongke. editor.&#160;Olariu, Stephan. editor.&#160;Cao, Jiannong. editor.&#160;Johnson, David B. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-12-01T12:26:53Z 2024-12-01T12:26:53Z Yazar&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>