Arama Sonu&ccedil;lar&#305; Information. - Daralt&#305;lm&#305;&#351;: Data Encryption. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300$0026isd$003dtrue? 2024-12-12T06:58:34Z Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334755 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Janczewski, Lech J. editor.&#160;Wolfe, Henry B. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334755.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:330694 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330694.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:331112 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331112.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335157.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335160.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335098.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332941.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334470.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334519.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334720.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334958.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335194.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334187 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Kirchner, Matthias. editor.&#160;Ghosal, Dipak. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334187.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334301.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334613.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334616.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335107.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;ONLINE(331766.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334049.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334399.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334582 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Fern&aacute;ndez-Gago, Carmen. editor.&#160;Martinelli, Fabio. editor.&#160;Pearson, Siani. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334582.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335063.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:330828 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330828.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330984.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:331022 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Hill, Richard. author.&#160;Hirsch, Laurie. author.&#160;Lake, Peter. author.&#160;Moshiri, Siavash. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331022.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331796.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332276.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332957.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332909.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(333021.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334078.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334097.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334122.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334236 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;J&uuml;rjens, Jan. editor.&#160;Livshits, Benjamin. editor.&#160;Scandariato, Riccardo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334236.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334316.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331610.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332468.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332915.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334145.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334401.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334514 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor.&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334514.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334696 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Huth, Michael. editor.&#160;Asokan, N. editor.&#160;&#268;apkun, Srdjan. editor.&#160;Flechais, Ivan. editor.&#160;Coles-Kemp, Lizzie. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334696.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334707.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334710 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Doyen, Guillaume. editor.&#160;Waldburger, Martin. editor.&#160;&#268;eleda, Pavel. editor.&#160;Sperotto, Anna. editor.&#160;Stiller, Burkhard. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334710.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334726.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334746.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334767.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334863.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334878.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334880.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334892.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334909.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334975 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334975.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335002.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335197.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335299.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334179.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334184.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334132.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334305.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers ent://SD_ILS/0/SD_ILS:334561 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Guyot, Vincent. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334561.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334620.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334635.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334638.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335057 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Accorsi, Rafael. editor.&#160;Ranise, Silvio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335057.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335066 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Palamidessi, Catuscia. editor.&#160;Ryan, Mark D. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335066.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335076.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335077.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335088.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2024-12-12T06:58:34Z 2024-12-12T06:58:34Z Yazar&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335154.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>