Arama Sonuçları Information Theory. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bTheory.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2025-03-19T14:15:16ZInformation Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346162025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334616.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1969952025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1945712025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1919732025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Abe, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1907852025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1885432025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Onieva, Jose A. editor. Sauveron, Damien. editor. Chaumette, Serge. editor. Gollmann, Dieter. editor. Markantonakis, Konstantinos. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892342025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877202025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1865132025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852142025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4851782025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Economics of Information Security and Privacy IIIent://SD_ILS/0/SD_ILS:3312942025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Schneier, Bruce. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331294.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Security Deterrence and IT Protection for Critical Infrastructuresent://SD_ILS/0/SD_ILS:3329092025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341222025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Dawson, Ed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334122.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3341792025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334179.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341842025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334184.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347072025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334707.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347202025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334720.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:3348102025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Böhme, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334810.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:3349842025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334984.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Authentication Problems and Solutionsent://SD_ILS/0/SD_ILS:3316102025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Jakobsson, Markus. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331610.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Moving Target Defense II Application of Game Theory and Adversarial Modelingent://SD_ILS/0/SD_ILS:3317662025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE(331766.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Automatic Malware Analysis An Emulator Based Approachent://SD_ILS/0/SD_ILS:3317962025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331796.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuitsent://SD_ILS/0/SD_ILS:3321162025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Peeters, Eric. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332116.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Wireless Implantable Medical Devicesent://SD_ILS/0/SD_ILS:3322202025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Hei, Xiali. author. Du, Xiaojiang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332220.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Location Privacy Protection in Mobile Networksent://SD_ILS/0/SD_ILS:3324682025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332468.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3346132025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334613.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346202025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Youssef, Amr. editor. Nitaj, Abderrahmane. editor. Hassanien, Aboul Ella. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334620.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348922025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Shi, Yun Q. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334892.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasuresent://SD_ILS/0/SD_ILS:3349822025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334982.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351972025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Stam, Martijn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335197.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Android Malwareent://SD_ILS/0/SD_ILS:3322762025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332276.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedingsent://SD_ILS/0/SD_ILS:3329572025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Abdalla, Michel. editor. Nita-Rotaru, Cristina. editor. Dahab, Ricardo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332957.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Modern Cryptography Primer Theoretical Foundations and Practical Applicationsent://SD_ILS/0/SD_ILS:3350992025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335099.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1891132025-03-19T14:15:16Z2025-03-19T14:15:16ZYazar Baek, Joonsang. editor. Bao, Feng. editor. Chen, Kefei. editor. Lai, Xuejia. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>