Arama Sonuçları INTERNET - Daraltılmış: Data Encryption.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dINTERNET$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300$0026isd$003dtrue?2024-12-01T20:30:46ZEmerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347102024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Doyen, Guillaume. editor. Waldburger, Martin. editor. Čeleda, Pavel. editor. Sperotto, Anna. editor. Stiller, Burkhard. editor.<br/>Yer Numarası ONLINE(334710.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347672024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334767.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347552024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334755.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349582024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Yer Numarası ONLINE(334958.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349752024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Yer Numarası ONLINE(334975.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343012024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Mustofa, Khabib. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. Weippl, Edgar. editor. You, Ilsun. editor.<br/>Yer Numarası ONLINE(334301.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:3343162024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Keromytis, Angelos D. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334316.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papersent://SD_ILS/0/SD_ILS:3345612024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Guyot, Vincent. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334561.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346962024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Huth, Michael. editor. Asokan, N. editor. Čapkun, Srdjan. editor. Flechais, Ivan. editor. Coles-Kemp, Lizzie. editor.<br/>Yer Numarası ONLINE(334696.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Guide to Cloud Computing Principles and Practiceent://SD_ILS/0/SD_ILS:3310222024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331022.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Automatic Malware Analysis An Emulator Based Approachent://SD_ILS/0/SD_ILS:3317962024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331796.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Security Deterrence and IT Protection for Critical Infrastructuresent://SD_ILS/0/SD_ILS:3329092024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and the Networked Societyent://SD_ILS/0/SD_ILS:3329152024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332915.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthdayent://SD_ILS/0/SD_ILS:3351542024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335154.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:3311122024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331112.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3330212024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Zia, Tanveer. editor. Zomaya, Albert. editor. Varadharajan, Vijay. editor. Mao, Morley. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(333021.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3340972024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334097.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:3341452024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Christianson, Bruce. editor. Malcolm, James A. editor. Matyáš, Vashek. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334145.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy Preserving in Social Networksent://SD_ILS/0/SD_ILS:3352992024-12-01T20:30:46Z2024-12-01T20:30:46ZYazar Chbeir, Richard. editor. Al Bouna, Bechara. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335299.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>