Arama Sonu&ccedil;lar&#305; Zhou, Jianying. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dZhou$00252C$002bJianying.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-27T03:33:44Z Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488530 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor.&#160;Gal-Oz, Nurit. editor.&#160;Zhang, Jie. editor.&#160;Gudes, Ehud. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183003 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor.&#160;Lopez, Javier. editor.&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security Workshops ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&amp;P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521216 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor. (orcid)&#160;Batina, Lejla. editor.&#160;Li, Zengpeng. editor.&#160;Lin, Jingqiang. editor.&#160;Losiouk, Eleonora. editor.<br/>Yer Numaras&#305;&#160;XX(521216.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193205 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Jajodia, Sushil. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16161-2">http://dx.doi.org/10.1007/978-3-642-16161-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518785 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518785.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332941.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 14th International Conference, ISC 2011, Xi&rsquo;an, China, October 26-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195771 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;Li, Hui. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:167284 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Onieva, Jos&eacute; A. author.&#160;Lopez, Javier. author.&#160;Zhou, Jianying. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191214 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Chen, Yan. editor.&#160;Dimitriou, Tassos D. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183605 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Chen, Kefei. editor.&#160;Deng, Robert. editor.&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183050 2024-12-27T03:33:44Z 2024-12-27T03:33:44Z Yazar&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;Pang, HweeHwa. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>