Search Results for Data encryption (Computer science). SirsiDynix Enterprise https://bilge.isikun.edu.tr/client/tr_TR/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list 2024-11-10T06:19:06Z Writing secure code ent://SD_ILS/0/SD_ILS:18622 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-<br/>Yer Numarası&#160;QA76.9.A25 H698 2003<br/>ISBN&#160;9780735617223<br/>Format:&#160;Books<br/> Chaos-based cryptography ent://SD_ILS/0/SD_ILS:28440 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kocarev, L. (Ljupco)&#160;Lian, Shiguo.<br/>Yer Numarası&#160;QA76.9.A25 C465 2011<br/>ISBN&#160;9783642205415&#160;9783642205422<br/>Format:&#160;Books<br/> The block cipher companion ent://SD_ILS/0/SD_ILS:28659 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Knudsen, Lars, 1962-&#160;Robshaw, Matthew.<br/>Yer Numarası&#160;QA76.9.A25 K58 2011<br/>ISBN&#160;9783642173417<br/>Format:&#160;Books<br/> Algebraic cryptanalysis ent://SD_ILS/0/SD_ILS:25890 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bard, Gregory V.<br/>Yer Numarası&#160;QA76.9 .B37 2009<br/>ISBN&#160;9780387887562<br/>Format:&#160;Books<br/> SSH, the secure shell : the definitive guide ent://SD_ILS/0/SD_ILS:13906 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Barrett, Daniel J.&#160;Silverman, Richard E.&#160;Byrnes, Robert G.<br/>Yer Numarası&#160;QA76.76.O63 B369 2005<br/>ISBN&#160;9780596008956<br/>Elektronik Erişim&#160;<a href="http://digital.isikun.edu.tr/contents/0596008953.html">Table of contents only</a> <a href="http://www.loc.gov/catdir/enhancements/fy0715/2005283598-d.html">Publisher description</a><br/>Format:&#160;Books<br/> Cryptography and security services mechanisms and applications ent://SD_ILS/0/SD_ILS:2010358 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mogollon, Manuel.&#160;IGI Global eBooks&#160;IGI Global<br/>Yer Numarası&#160;QA76.9 .A25 M663 2008E<br/>ISBN&#160;9781599048390<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.4018/978-1-59904-837-6">Full Text Available From IGI Global 2008 Packages</a><br/>Format:&#160;Electronic Resources<br/> Multidisciplinary perspectives in cryptology and information security ent://SD_ILS/0/SD_ILS:2008331 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Al Maliky, Sattar B. Sadkhan, 1954- editor.&#160;Abbas, Nidaa A., editor.&#160;IGI Global eBooks&#160;IGI Global<br/>Yer Numarası&#160;QA76.9 .A25 M846 2014E<br/>ISBN&#160;9781466658097<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.4018/978-1-4666-5808-0">Full Text Available From IGI Global 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Handbook of research on modern cryptographic solutions for computer and cyber security ent://SD_ILS/0/SD_ILS:2008876 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gupta, Brij, 1982- editor.&#160;Agrawal, Dharma P. (Dharma Prakash), 1945- editor.&#160;Yamaguchi, Shingo, 1969- editor.&#160;IGI Global eBooks&#160;IGI Global<br/>Yer Numarası&#160;QA76.9 .A25 H364 2016E<br/>ISBN&#160;9781522501060<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.4018/978-1-5225-0105-3">Full Text Available From IGI Global 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:6100 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Yer Numarası&#160;QA76.9.A25 S687 2007<br/>ISBN&#160;9780470114865<br/>Elektronik Erişim&#160;<a href="http://www.loc.gov/catdir/toc/ecip078/2007001277.html">Table of contents only</a> <a href="http://www.loc.gov/catdir/enhancements/fy0741/2007001277-b.html">Contributor biographical information</a> <a href="http://www.loc.gov/catdir/enhancements/fy0741/2007001277-d.html">Publisher description</a><br/>Format:&#160;Books<br/> Modern Cryptology A Tutorial ent://SD_ILS/0/SD_ILS:1924382 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Brassard, Gilles. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9780387347752<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0040274">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO '91 Proceedings ent://SD_ILS/0/SD_ILS:1924913 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Feigenbaum, Joan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540467663<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-46766-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Building in Big Brother The Cryptographic Policy Debate ent://SD_ILS/0/SD_ILS:1925830 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hoffman, Lance J. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781461225249<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4612-2524-9">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Differential Cryptanalysis of the Data Encryption Standard ent://SD_ILS/0/SD_ILS:1925954 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Biham, Eli. author.&#160;Shamir, Adi. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781461393146<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4613-9314-6">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO '89 Proceedings ent://SD_ILS/0/SD_ILS:1922569 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Brassard, Gilles. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9780387348056<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/0-387-34805-0">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic strategies for solving complex problems in cryptography ent://SD_ILS/0/SD_ILS:2009434 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Balasubramanian, Kannan, 1968 August 15- editor.&#160;Rajakani, M., 1983- editor.&#160;IGI Global eBooks&#160;IGI Global<br/>Yer Numarası&#160;QA76.9 .D335 A44 2018E<br/>ISBN&#160;9781522529163<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.4018/978-1-5225-2915-6">Full Text Available From IGI Global 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO '90 Proceedings ent://SD_ILS/0/SD_ILS:1924864 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Menezes, Alfred J. editor.&#160;Vanstone, Scott A. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540384243<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-38424-3">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology 1981 - 1997 Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conference, 1981 - 1997 ent://SD_ILS/0/SD_ILS:1926162 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;McCurley, Kevin S. editor.&#160;Ziegler, Claus D. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540496779<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-49677-7">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT '87 Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings ent://SD_ILS/0/SD_ILS:1926220 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chaum, David. editor.&#160;Price, Wyn L. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540391180<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-39118-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1840692 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sion, Radu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642145773<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-14577-3">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1884573 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662588208<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-58820-8">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings ent://SD_ILS/0/SD_ILS:1840611 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Barreto, Paulo S.L.M. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642147128<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-14712-8">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings ent://SD_ILS/0/SD_ILS:1887149 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yang, Min. editor. (orcid)0000-0001-9714-5545&#160;Chen, Chao. editor. (orcid)0000-0003-1355-3870&#160;Liu, Yang. editor. (orcid)0000-0001-7300-9215&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030927080<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-92708-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT '88 Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988. Proceedings ent://SD_ILS/0/SD_ILS:1924255 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;G&uuml;nther, Christoph G. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540459613<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-45961-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO '87 Proceedings ent://SD_ILS/0/SD_ILS:1923520 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Pomerance, Carl. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540481843<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-48184-2">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO '86 Proceedings ent://SD_ILS/0/SD_ILS:1924889 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Odlyzko, Andrew M. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540477211<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-47721-7">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Protecting Oracle Database 12c ent://SD_ILS/0/SD_ILS:1877168 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Wright, Paul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>ISBN&#160;9781430262121<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6212-1">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Veri gizleme ent://SD_ILS/0/SD_ILS:54074 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yalman,Yıldıray, author.&#160;&Ccedil;etin, &Ouml;zdemir, author.&#160;Ert&uuml;rk, İsmail, author.&#160;Akar, Feyzi, author.<br/>Yer Numarası&#160;QA76.9.A25 V47 2014<br/>ISBN&#160;9786053331414<br/>Format:&#160;Books<br/> Expert Oracle Application Express Security ent://SD_ILS/0/SD_ILS:1876905 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Spendolini, Scott. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>ISBN&#160;9781430247326<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-4732-6">Full Text Available From Springer Nature Professional and Applied Computing 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSH : strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:13923 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Dwivedi, Himanshu.<br/>Yer Numarası&#160;QA76.76.O63 D895 2004<br/>ISBN&#160;9780471458807<br/>Elektronik Erişim&#160;<a href="http://www.loc.gov/catdir/toc/wiley041/2004297174.html">Table of contents</a> <a href="http://www.loc.gov/catdir/description/wiley041/2004297174.html">Publisher description</a><br/>Format:&#160;Books<br/> Diffusion in Social Networks ent://SD_ILS/0/SD_ILS:1882548 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Shakarian, Paulo. author.&#160;Bhatnagar, Abhivav. author.&#160;Aleali, Ashkan. author.&#160;Shaabani, Elham. author.&#160;Guo, Ruocheng. author.<br/>Yer Numarası&#160;Q334 -342<br/>ISBN&#160;9783319231051<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-23105-1">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Design and Cryptanalysis of ZUC A Stream Cipher in Mobile Telephony ent://SD_ILS/0/SD_ILS:1886487 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mukherjee, Chandra Sekhar. author.&#160;Roy, Dibyendu. author.&#160;Maitra, Subhamoy. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9789813348820<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-33-4882-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:1765591 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stallings, William, author.<br/>Yer Numarası&#160;TK5105.59 .S713 2011<br/>ISBN&#160;9780137056323<br/>Format:&#160;Books<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:14317 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stallings, William.<br/>Yer Numarası&#160;TK5105.59 .S713 2003<br/>ISBN&#160;9780130914293<br/>Format:&#160;Books<br/> Public-Key Cryptography: State of the Art and Future Directions E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991. Final Report ent://SD_ILS/0/SD_ILS:1927676 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Beth, Thomas. editor.&#160;Frisch, Markus. editor.&#160;Simmons, Gustavus J. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540467809<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-55215-4">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:5308 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stallings, William.&#160;Stallings, William. Network and internetwork security.<br/>Yer Numarası&#160;TK5105.59 .S713 1999<br/>ISBN&#160;9780138690175<br/>Format:&#160;Books<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:16993 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stallings, William.<br/>Yer Numarası&#160;TK5105.59 .S713 2006<br/>ISBN&#160;9780131873162<br/>Elektronik Erişim&#160;<a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">Table of contents only</a><br/>Format:&#160;Books<br/> The code book : the science of secrecy from ancient Egypt to quantum cryptography ent://SD_ILS/0/SD_ILS:6116 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Singh, Simon.<br/>Yer Numarası&#160;Z103 .S56 1999<br/>ISBN&#160;9780385495325<br/>Format:&#160;Books<br/> Advances in Cryptology Proceedings of Crypto 82 ent://SD_ILS/0/SD_ILS:1925129 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chaum, David. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781475706024<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4757-0602-4">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Android Apps Security ent://SD_ILS/0/SD_ILS:1876779 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gunasekera, Sheran. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.59<br/>ISBN&#160;9781430240631<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-4063-1">Full Text Available From Springer Nature Professional and Applied Computing 2012 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Computational Number Theory ent://SD_ILS/0/SD_ILS:1932080 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lam, Kwok Y. editor.&#160;Shparlinski, Igor. editor.&#160;Wang, Huaxiong. editor. (orcid)0000-0002-7669-8922&#160;Xing, Chaoping. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783034882958<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-0348-8295-8">Full Text Available From Springer Nature Mathematics and Statistics Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> The Manager's Guide to Web Application Security A Concise Guide to the Weaker Side of the Web ent://SD_ILS/0/SD_ILS:1877180 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lepofsky, Ron. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.625<br/>ISBN&#160;9781484201480<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0148-0">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Error Correction An Algebraic Introduction and Real-World Applications ent://SD_ILS/0/SD_ILS:1893467 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Childs, Lindsay N. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA150 -272<br/>ISBN&#160;9783030154530<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-15453-0">Full Text Available From Springer Nature Mathematics and Statistics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> World Conference on Computers in Education VI WCCE '95 Liberating the Learner, Proceedings of the sixth IFIP World Conference on Computers in Education, 1995 ent://SD_ILS/0/SD_ILS:1924392 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Tinsley, David. editor.&#160;van Weert, Tom J. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .M3<br/>ISBN&#160;9780387348445<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-34844-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Oracle database 11g R2 : ileri veritabanı y&ouml;netimi ent://SD_ILS/0/SD_ILS:33670 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;&Ouml;zt&uuml;rk, Talip Hakan.<br/>Yer Numarası&#160;QA76.9.D3 O98 2012<br/>ISBN&#160;9789944711814<br/>Format:&#160;Books<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:1845040 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319705033<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-70503-3">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography - SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845869 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Adams, Carlisle. editor.&#160;Camenisch, Jan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319725659<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-72565-9">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Operations Building, Defending, and Attacking Modern Computer Networks ent://SD_ILS/0/SD_ILS:1877298 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;O'Leary, Mike. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781484204573<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0457-3">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:1882011 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781461478737<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-7873-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843149 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319051499<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-05149-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1882124 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662448939<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-44893-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Obfuscation A Survey ent://SD_ILS/0/SD_ILS:1885823 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Horv&aacute;th, M&aacute;t&eacute;. author.&#160;Butty&aacute;n, Levente. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319980416<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-98041-6">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1882027 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662456705<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-45670-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:1877164 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430261469<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6146-9">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses ent://SD_ILS/0/SD_ILS:1876587 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Snyder, Chris. author.&#160;Myer, Thomas. author.&#160;Southwell, Michael. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.625<br/>ISBN&#160;9781430233190<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-3319-0">Full Text Available From Springer Nature Professional and Applied Computing 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> From Hacking to Report Writing An Introduction to Security and Penetration Testing ent://SD_ILS/0/SD_ILS:1877577 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Svensson, Robert. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781484222836<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2283-6">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats ent://SD_ILS/0/SD_ILS:1877259 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Donaldson, Scott. author.&#160;Siegel, Stanley. author.&#160;Williams, Chris K. author.&#160;Aslam, Abdul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430260837<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6083-7">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart TV Security Media Playback and Digital Video Broadcast ent://SD_ILS/0/SD_ILS:1882753 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mich&eacute;le, Benjamin. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319209944<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-20994-4">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Protocols for authentication and key establishment ent://SD_ILS/0/SD_ILS:14885 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Boyd, Colin.&#160;Mathuria, Anish, 1967-<br/>Yer Numarası&#160;TK5105.59 .B59 2003<br/>ISBN&#160;9783540431077<br/>Elektronik Erişim&#160;<a href="http://www.loc.gov/catdir/enhancements/fy0813/2003054427-d.html">Publisher description</a> <a href="http://www.loc.gov/catdir/enhancements/fy0813/2003054427-t.html">Table of contents only</a><br/>Format:&#160;Books<br/> Protocols, Strands, and Logic Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday ent://SD_ILS/0/SD_ILS:1887252 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Dougherty, Daniel. editor.&#160;Meseguer, Jos&eacute;. editor.&#160;M&ouml;dersheim, Sebastian Alexander. editor. (orcid)0000-0002-6901-8319&#160;Rowe, Paul. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783030916312<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-91631-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Applications of Analytic Number Theory Complexity Lower Bounds and Pseudorandomness ent://SD_ILS/0/SD_ILS:1932098 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Shparlinski, Igor. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA241 -247.5<br/>ISBN&#160;9783034880374<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-0348-8037-4">Full Text Available From Springer Nature Mathematics and Statistics Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Performance and security issues in e-payment systems: pay on-line case ent://SD_ILS/0/SD_ILS:22986 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Karahasan, Orhan author.&#160;Kuru, Selahattin, 1953- thesis advisor.&#160;Işık &Uuml;niversitesi.&#160;Işık University.&#160;M.S. in Computer Engineering. Thesis.<br/>Yer Numarası&#160;HG1710 .K37 2006<br/>Elektronik Erişim&#160;<a href="http://hdl.handle.net/11729/949">Click for open access</a><br/>Format:&#160;Books<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:1877237 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Robichau, Bernard Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430266778<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6677-8">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843225 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319098432<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-09843-2">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Deep Reinforcement Learning Frontiers of Artificial Intelligence ent://SD_ILS/0/SD_ILS:1884985 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sewak, Mohit. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.6 -76.66<br/>ISBN&#160;9789811382857<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-8285-7">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats ent://SD_ILS/0/SD_ILS:1878069 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Donaldson, Scott E. author.&#160;Siegel, Stanley G. author.&#160;Williams, Chris K. author.&#160;Aslam, Abdul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781484232583<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3258-3">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> 10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy ent://SD_ILS/0/SD_ILS:1877179 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Rzeszut, Eric. author.&#160;Bachrach, Daniel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781484203675<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0367-5">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842703 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Riis Nielsen, Hanne. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642414886<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41488-6">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:1842485 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Paul, Goutam. editor.&#160;Vaudenay, Paul. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319035154<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-03515-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845363 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973&#160;Teglia, Yannick. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319752082<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75208-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle and Java Security Programming Secure Oracle Database Applications With Java ent://SD_ILS/0/SD_ILS:1876715 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Coffin, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.73 .J38<br/>ISBN&#160;9781430238324<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-3832-4">Full Text Available From Springer Nature Professional and Applied Computing 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Prime Numbers and Computer Methods for Factorization ent://SD_ILS/0/SD_ILS:1889798 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Riesel, Hans. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA241 -247.5<br/>ISBN&#160;9780817682989<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-8176-8298-9">Full Text Available From Springer Nature Mathematics and Statistics 2012 Packages</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:1877091 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lakhe, Bhushan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430265450<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6545-0">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:1883092 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811027413<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-2741-3">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1882527 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Niu, Wenjia. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Liu, Jiqiang. editor.&#160;Tan, Jianlong. editor.&#160;Guo, Li. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662486832<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-48683-2">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology Proceedings of Crypto 83 ent://SD_ILS/0/SD_ILS:1924044 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chaum, David. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781468447309<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4684-4730-9">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844374 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Pasalic, Enes. editor.&#160;Knudsen, Lars R. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319291727<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-29172-7">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Software and Intellectual Property ent://SD_ILS/0/SD_ILS:1924535 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Office of Technology Assessment. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781349124435<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12443-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1884583 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bilgin, Beg&uuml;l. editor.&#160;Fischer, Jean-Bernard. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030154622<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-15462-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843712 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319213569<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-21356-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883670 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423&#160;Kim, Dong Seong. editor. (orcid)0000-0003-2605-187X&#160;Zhang, Xuyun. editor. (orcid)0000-0001-7353-4159&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811054211<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-5421-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 Proceedings ent://SD_ILS/0/SD_ILS:1923701 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Paillier, Pascal. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540456643<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-45664-3">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro Cryptography and Cryptanalysis Creating Advanced Algorithms with C# and .NET ent://SD_ILS/0/SD_ILS:1878757 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mihailescu, Marius Iulian. author.&#160;Nita, Stefania Loredana. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781484263679<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6367-9">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Probabilistic and Statistical Methods in Cryptology An Introduction by Selected Topics ent://SD_ILS/0/SD_ILS:1924137 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Neuenschwander, Daniel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540259428<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b97045">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Contact Tracing in Post-Covid World A Cryptologic Approach ent://SD_ILS/0/SD_ILS:1894264 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chakraborty, Pranab. author.&#160;Maitra, Subhamoy. author.&#160;Nandi, Mridul. author.&#160;Talnikar, Suprita. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9789811597275<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9727-5">Full Text Available From Springer Nature Mathematics and Statistics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS '2002 Międzyzdroje, Poland October 23-25, 2002 Proceedings ent://SD_ILS/0/SD_ILS:1918244 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Soldek, Jerzy. editor.&#160;Drobiazgiewicz, Leszek. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>ISBN&#160;9781441992260<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4419-9226-0">Full Text Available From Springer Nature Engineering Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842910 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bertoni, Guido Marco. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642403491<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-40349-1">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842892 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319027265<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-02726-5">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security ent://SD_ILS/0/SD_ILS:1877310 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Arthur, Will. author.&#160;Challener, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430265849<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6584-9">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intel Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters ent://SD_ILS/0/SD_ILS:1877041 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Futral, William. author.&#160;Greene, James. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430261490<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6149-0">Full Text Available From Springer Nature Professional and Applied Computing 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques in Curvelet and Ridgelet Domain ent://SD_ILS/0/SD_ILS:1883101 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Rao, Channapragada Rama Seshagiri. author.&#160;Prasad, Munaga V.N.K. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319329512<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32951-2">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:1877126 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430265726<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6572-6">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843329 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642552205<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-55220-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Partially Homomorphic Encryption ent://SD_ILS/0/SD_ILS:1886655 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ko&ccedil;, &Ccedil;etin Kaya. author.&#160;&Ouml;zdemir, Funda. author.&#160;&Ouml;demiş &Ouml;zger, Zeynep. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030876296<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-87629-6">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> iOS Forensic Analysis for iPhone, iPad, and iPod touch ent://SD_ILS/0/SD_ILS:1876588 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Morrissey, Sean. author.&#160;Campbell, Tony. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.8 .M3<br/>ISBN&#160;9781430233435<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-3343-5">Full Text Available From Springer Nature Professional and Applied Computing 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:1882940 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781493966011<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-6601-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1844964 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;O'Neill, M&aacute;ire. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319710457<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-71045-7">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:1879648 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Venter, Hein. editor.&#160;Eloff, Mariki. editor.&#160;Labuschagne, Les. editor.&#160;Eloff, Jan. editor.&#160;Solms, Rossouw von. editor.<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9780387723679<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-72367-9">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:1877141 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430263562<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6356-2">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:1882229 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783319040424<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-04042-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:1881790 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chen, Lei. editor.&#160;Ji, Jiahuang. editor.&#160;Zhang, Zihong. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783642365119<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36511-9">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Beginning Ethical Hacking with Python ent://SD_ILS/0/SD_ILS:1877751 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sinha, Sanjib. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.73 .P98<br/>ISBN&#160;9781484225417<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2541-7">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845789 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319785561<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-78556-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro Oracle Identity and Access Management Suite ent://SD_ILS/0/SD_ILS:1877602 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ramey, Kenneth. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .A65<br/>ISBN&#160;9781484215210<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1521-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Multi-photon Quantum Secure Communication ent://SD_ILS/0/SD_ILS:1812711 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Verma, Pramode K. author.&#160;El Rifai, Mayssaa. author.&#160;Chan, Kam Wai Clifford. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9789811086182<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8618-2">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Executive Guide to Preventing Information Technology Disasters ent://SD_ILS/0/SD_ILS:1923726 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ennals, Richard. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781447103837<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-0383-7">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Guide to Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:1922185 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hankerson, Darrel. author.&#160;Menezes, Alfred J. author.&#160;Vanstone, Scott. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9780387218465<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b97644">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure Information Management Using Linguistic Threshold Approach ent://SD_ILS/0/SD_ILS:1881986 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ogiela, Marek R. author.&#160;Ogiela, Urszula. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781447150169<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-5016-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Audio Watermarking Based on Singular Value Decomposition ent://SD_ILS/0/SD_ILS:1808779 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Dhar, Pranab Kumar. author.&#160;Shimamura, Tetsuya. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5102.9<br/>ISBN&#160;9783319148007<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-14800-7">Full Text Available From Springer Nature Engineering 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:1923252 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642871269<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-87126-9">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> An Information Security Handbook ent://SD_ILS/0/SD_ILS:1925010 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hunter, John M. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781447102618<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-0261-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843142 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319115993<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11599-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Animal Biometrics Techniques and Applications ent://SD_ILS/0/SD_ILS:1883458 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kumar, Santosh. author.&#160;Singh, Sanjay Kumar. author.&#160;Singh, Rishav. author.&#160;Singh, Amit Kumar. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q337.5<br/>ISBN&#160;9789811079566<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-7956-6">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Binary Quadratic Forms An Algorithmic Approach ent://SD_ILS/0/SD_ILS:1888225 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Buchmann, Johannes. author.&#160;Vollmer, Ulrich. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA150 -272<br/>ISBN&#160;9783540463689<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-46368-9">Full Text Available From Springer Nature Mathematics and Statistics 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842365 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bloem, Roderick. editor.&#160;Lipp, Peter. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319034911<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-03491-1">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 ent://SD_ILS/0/SD_ILS:1924928 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Beth, Thomas. editor.&#160;Cot, Norbert. editor.&#160;Ingemarsson, Ingemar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540397571<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-39757-4">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic and Algebraic Circuits ent://SD_ILS/0/SD_ILS:1853755 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lloris Ruiz, Antonio. author.&#160;Castillo Morales, Encarnaci&oacute;n. author.&#160;Parrilla Roure, Luis. author.&#160;Garc&iacute;a R&iacute;os, Antonio. author.&#160;Lloris Meseguer, Mar&iacute;a Jos&eacute;. author.<br/>Yer Numarası&#160;Q342<br/>ISBN&#160;9783030672669<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-67266-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Quantum Communication Networks ent://SD_ILS/0/SD_ILS:1815074 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bassoli, Riccardo. author.&#160;Boche, Holger. author.&#160;Deppe, Christian. author.&#160;Ferrara, Roberto. author.&#160;Fitzek, Frank H. P. author.<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9783030629380<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-62938-0">Full Text Available From Springer Nature Engineering 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory ICRAPAM 2018, New Delhi, India, October 23-25 ent://SD_ILS/0/SD_ILS:1894096 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Deo, Naokant. editor.&#160;Gupta, Vijay. editor.&#160;Acu, Ana Maria. editor.&#160;Agrawal, P. N. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA402.5 -402.6<br/>ISBN&#160;9789811511578<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-1157-8">Full Text Available From Springer Nature Mathematics and Statistics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Internet Security Dictionary ent://SD_ILS/0/SD_ILS:1922869 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Phoha, Vir V. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9780387224473<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b98881">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings ent://SD_ILS/0/SD_ILS:1927084 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Anderson, Ross. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540484561<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-58108-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Security Architecture Design and Verification ent://SD_ILS/0/SD_ILS:1922179 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gutmann, Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9780387215518<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b97264">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:1923468 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bauer, F.L. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662034521<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-03452-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection A Data Mining Approach ent://SD_ILS/0/SD_ILS:1885477 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sengupta, Nandita. author.&#160;Sil, Jaya. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9789811527166<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-2716-6">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> TErrestrial Trunked RAdio - TETRA A Global Security Tool ent://SD_ILS/0/SD_ILS:1816190 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Stavroulakis, Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9783540711926<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-71192-9">Full Text Available From Springer Nature Engineering 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Geometry for Coding Theory and Cryptography IPAM, Los Angeles, CA, February 2016 ent://SD_ILS/0/SD_ILS:1892613 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Howe, Everett W. editor.&#160;Lauter, Kristin E. editor.&#160;Walker, Judy L. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA564 -609<br/>ISBN&#160;9783319639314<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-63931-4">Full Text Available From Springer Nature Mathematics and Statistics 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:1882178 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319103716<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10371-6">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843471 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319138411<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-13841-1">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Coding Theory and Applications 3rd International Colloquium, Toulon, France, November 2-4, 1988. Proceedings ent://SD_ILS/0/SD_ILS:1925585 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Cohen, Gerard. editor.&#160;Wolfmann, Jacques. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540467267<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0019841">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883342 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Xu, Ming. editor.&#160;Qin, Zheng. editor.&#160;Yan, Fei. editor.&#160;Fu, Shaojing. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811070808<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-7080-8">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:1845448 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030033293<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03329-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:1881669 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319014333<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-01433-3">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings ent://SD_ILS/0/SD_ILS:1841056 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;De Decker, Bart. editor.&#160;Schaum&uuml;ller-Bichl, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783642132414<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-13241-4">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Insecurity Risking the System ent://SD_ILS/0/SD_ILS:1879094 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Furnell, Steven M. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9781846282706<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/1-84628-270-5">Full Text Available From Springer Nature Computer Science 2005 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883968 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319788135<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-78813-5">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:1810695 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9789811032356<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3235-6">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843186 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319075365<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-07536-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Integrity Primitives for Secure Information Systems Final RIPE Report of RACE Integrity Primitives Evaluation ent://SD_ILS/0/SD_ILS:1927725 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bosselaers, Antoon. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540485179<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-60640-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:1877123 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430263838<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6383-8">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Geometries, Codes and Cryptography ent://SD_ILS/0/SD_ILS:1927859 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Longo, G. editor.&#160;Marchi, M. editor.&#160;Sgarro, A. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783709128381<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-7091-2838-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Elements of Computer Security ent://SD_ILS/0/SD_ILS:1880246 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9780857290069<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-85729-006-9">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1883820 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Li, Fagen. editor. (orcid)0000-0001-6289-1265&#160;Takagi, Tsuyoshi. editor.&#160;Xu, Chunxiang. editor.&#160;Zhang, Xiaosong. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811330957<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-3095-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:1845449 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030033262<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03326-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:1845450 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030033323<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03332-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:1882844 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Liu, Wen Ming. author.&#160;Wang, Lingyu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319426440<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-42644-0">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:1807570 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9783642385865<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-38586-5">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883971 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319788166<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-78816-6">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Coding Theory, Cryptography and Related Areas Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998 ent://SD_ILS/0/SD_ILS:1926241 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Buchmann, Johannes. editor.&#160;Hoeholdt, Tom. editor.&#160;Stichtenoth, Henning. editor.&#160;Tapia-Recillas, Horacio. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642571893<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-57189-3">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:1883439 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319665054<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-66505-4">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1884327 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183&#160;Yuen, Tsz Hon. editor. (orcid)0000-0002-0629-6792&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030319199<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-31919-9">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:1887976 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA241 -247.5<br/>ISBN&#160;9781402053344<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/1-4020-5334-4">Full Text Available From Springer Nature Mathematics and Statistics 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers ent://SD_ILS/0/SD_ILS:1924141 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Matsui, Mitsuru. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.758<br/>ISBN&#160;9783540454731<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-45473-X">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:1882852 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319321257<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32125-7">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Storage Security Concepts, Designs and Optimized Practices ent://SD_ILS/0/SD_ILS:1882865 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Galibus, Tatiana. author.&#160;Krasnoproshin, Viktor V. author. (orcid)0000-0002-9463-4869&#160;de Oliveira Albuquerque, Robson. author.&#160;Pignaton de Freitas, Edison. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783319449623<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-44962-3">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Lattice-Based Public-Key Cryptography in Hardware ent://SD_ILS/0/SD_ILS:1813224 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sinha Roy, Sujoy. author.&#160;Verbauwhede, Ingrid. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>ISBN&#160;9789813299948<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-32-9994-8">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Encrypted Email The History and Technology of Message Privacy ent://SD_ILS/0/SD_ILS:1882390 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Orman, Hilarie. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319213446<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-21344-6">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:1883140 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319426419<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-42641-9">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:1844479 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bao, Feng. editor.&#160;Chen, Liqun. editor.&#160;Deng, Robert H. editor.&#160;Wang, Guojun. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319491516<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-49151-6">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:1882267 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Budka, Kenneth C. author.&#160;Deshpande, Jayant G. author.&#160;Thottan, Marina. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9781447163022<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-6302-2">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Logic and Mathematics Applications to Computer Science and Cryptography ent://SD_ILS/0/SD_ILS:1931337 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Nievergelt, Yves. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA8.9 -10.3<br/>ISBN&#160;9781461201250<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4612-0125-0">Full Text Available From Springer Nature Mathematics and Statistics Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Random Numbers and Computers ent://SD_ILS/0/SD_ILS:1883839 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kneusel, Ronald T. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA297 -299.4<br/>ISBN&#160;9783319776972<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-77697-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Protocols for Authentication and Key Establishment ent://SD_ILS/0/SD_ILS:1925769 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Boyd, Colin. author.&#160;Mathuria, Anish. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662095270<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-09527-0">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:1811341 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>ISBN&#160;9789811013874<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1387-4">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:1842595 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642452048<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-45204-8">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:1807208 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Burleson, Wayne. editor.&#160;Carrara, Sandro. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>ISBN&#160;9781461416746<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-1674-6">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Domain Specific High-Level Synthesis for Cryptographic Workloads ent://SD_ILS/0/SD_ILS:1812382 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Khalid, Ayesha. author.&#160;Paul, Goutam. author.&#160;Chattopadhyay, Anupam. author. (orcid)0000-0002-8818-6983&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>ISBN&#160;9789811010705<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1070-5">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1882315 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642545252<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-54525-2">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:1882919 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781493964574<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-6457-4">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843251 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319083445<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-08344-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Finite Automata and Application to Cryptography ent://SD_ILS/0/SD_ILS:1880095 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Tao, Renji. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540782575<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-78257-5">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1844092 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lopez, Javier. editor.&#160;Wu, Yongdong. editor. (orcid)0000-0002-0850-724X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319175331<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-17533-1">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> iOS Penetration Testing A Definitive Guide to iOS Security ent://SD_ILS/0/SD_ILS:1877522 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Relan, Kunal. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.8 .M3<br/>ISBN&#160;9781484223550<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2355-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:1877026 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781430251149<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-5114-9">Full Text Available From Springer Nature Professional and Applied Computing 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843300 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319097701<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-09770-1">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1881678 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Singh, Karan. editor.&#160;Awasthi, Amit K. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783642379499<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-37949-9">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:1843530 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319112039<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11203-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:1843268 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319112121<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11212-1">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842419 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642376825<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-37682-5">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843330 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319121604<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-12160-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842685 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642380334<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-38033-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Design of Rijndael AES - The Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:1925845 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Daemen, Joan. author.&#160;Rijmen, Vincent. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662047224<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-04722-4">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844328 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;G&uuml;neysu, Tim. editor.&#160;Leander, Gregor. editor.&#160;Moradi, Amir. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319290782<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-29078-2">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845888 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319790633<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-79063-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1881589 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Zhi-zhong, Jun. editor.&#160;Mitton, Nathalie. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783642369582<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36958-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842753 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642403927<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-40392-7">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Signature Schemes General Framework and Fail-Stop Signatures ent://SD_ILS/0/SD_ILS:1925109 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Pfitzmann, Birgit. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A73<br/>ISBN&#160;9783540687122<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0024619">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings ent://SD_ILS/0/SD_ILS:1925058 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540478096<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-60590-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:1883417 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor. (orcid)0000-0002-0330-1963&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor. (orcid)0000-0003-0105-7730&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783319646534<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-64653-4">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing Systems Challenges, Approaches and Solutions ent://SD_ILS/0/SD_ILS:1880171 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Biskup, Joachim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540784425<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-78442-5">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> German Yearbook on Business History 1987 ent://SD_ILS/0/SD_ILS:1954487 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HB1 -846.8<br/>ISBN&#160;9783642739309<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-73930-9">Full Text Available From Springer Nature Business and Economics Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology ent://SD_ILS/0/SD_ILS:1790240 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hellwig, Daniel. author.&#160;Karlic, Goran. author.&#160;Huchzermeier, Arnd. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HF54.5 -54.56<br/>ISBN&#160;9783030401429<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-40142-9">Full Text Available From Springer Nature Business and Management 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845483 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319979168<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-97916-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843637 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Joye, Marc. editor.&#160;Moradi, Amir. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319167633<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-16763-3">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Stability Theory of Stream Ciphers ent://SD_ILS/0/SD_ILS:1923942 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Ding, Cunsheng. author.&#160;Xiao, Guozhen. author.&#160;Shan, Weijuan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540466260<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-54973-0">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2016 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845314 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hong, Seokhie. editor.&#160;Park, Jong Hwan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319531779<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-53177-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Guide to Digital Forensics A Concise and Practical Introduction ent://SD_ILS/0/SD_ILS:1883713 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;K&auml;vrestad, Joakim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319674506<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-67450-6">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843496 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319083025<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-08302-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:1811114 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor. (orcid)0000-0002-4010-773X&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>ISBN&#160;9783319592657<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-59265-7">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843389 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642545689<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-54568-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845511 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459&#160;Papadimitratos, Panos. editor. (orcid)0000-0002-3267-5374&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030004347<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-00434-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844449 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kwon, Soonhak. editor.&#160;Yun, Aaram. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319308401<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-30840-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT ent://SD_ILS/0/SD_ILS:1812435 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Zhang, Yushu. author.&#160;Xiang, Yong. author.&#160;Zhang, Leo Yu. author. (orcid)0000-0001-9330-2662&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5102.9<br/>ISBN&#160;9789811325236<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-2523-6">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:1842760 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642365942<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36594-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings ent://SD_ILS/0/SD_ILS:1925019 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783540455707<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/10720107">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844071 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lee, Jooyoung. editor.&#160;Kim, Jongsung. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319159430<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-15943-0">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1843608 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Foo, Ernest. editor. (orcid)0000-0002-3971-6415&#160;Stebila, Douglas. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319199627<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-19962-7">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 94 Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings ent://SD_ILS/0/SD_ILS:1924979 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540490340<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-58618-0">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843061 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319108797<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10879-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings ent://SD_ILS/0/SD_ILS:1925469 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Imai, Hideki. editor.&#160;Zheng, Yuliang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540691051<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0054009">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Distributed Programming Paradigms with Cryptography Applications ent://SD_ILS/0/SD_ILS:1923907 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Greenfield, Jonathan S. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .C65<br/>ISBN&#160;9783540490142<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0017590">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Improving Image Quality in Visual Cryptography ent://SD_ILS/0/SD_ILS:1813673 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Yan, Bin. author.&#160;Xiang, Yong. author. (orcid)0000-0001-5252-0831&#160;Hua, Guang. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5102.9<br/>ISBN&#160;9789811382895<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-8289-5">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844147 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Eisenbarth, Thomas. editor.&#160;&Ouml;zt&uuml;rk, Erdin&ccedil;. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319163635<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-16363-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Local Area Network Security Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3-6, 1989. Proceedings ent://SD_ILS/0/SD_ILS:1925921 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Berson, Thomas A. editor.&#160;Beth, Thomas. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783540468028<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-51754-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 92 Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992. Proceedings ent://SD_ILS/0/SD_ILS:1923815 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Deswarte, Yves. editor.&#160;Eizenberg, Gerard. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540474883<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0013888">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications ent://SD_ILS/0/SD_ILS:1883763 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;K&auml;vrestad, Joakim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319963198<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-96319-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings ent://SD_ILS/0/SD_ILS:1925980 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Lomas, Mark. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540696889<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0028154">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure Internet Programming Security Issues for Mobile and Distributed Objects ent://SD_ILS/0/SD_ILS:1925914 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Vitek, Jan. editor.&#160;Jensen, Christian D. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783540487494<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-48749-2">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1885223 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, Veronique. editor.&#160;Beckert, Bernhard. editor. (orcid)0000-0002-9672-3291&#160;K&uuml;sters, Ralf. editor. (orcid)0000-0002-9071-9312<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030306250<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-30625-0">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844138 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Herrera-Joancomart&iacute;, Jordi. editor.&#160;Lupu, Emil. editor.&#160;Posegga, Joachim. editor. (orcid)0000-0002-6468-809X&#160;Aldini, Alessandro. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319170169<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-17016-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2002 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings ent://SD_ILS/0/SD_ILS:1925702 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gollmann, Dieter. editor.&#160;Karjoth, G&uuml;nter. editor.&#160;Waidner, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540458531<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-45853-0">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844609 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Homma, Naofumi. editor.&#160;Medwed, Marcel. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319312712<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31271-2">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Complexity Theory and Cryptology An Introduction to Cryptocomplexity ent://SD_ILS/0/SD_ILS:1879204 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Rothe, J&ouml;rg. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540285205<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-28520-2">Full Text Available From Springer Nature Computer Science 2005 Packages</a><br/>Format:&#160;Electronic Resources<br/> Well Packed - Not a Bit Too Much Compression of Digital Data Explained in an Understandable Way ent://SD_ILS/0/SD_ILS:1894720 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Manz, Olaf. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .M35<br/>ISBN&#160;9783658347376<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-34737-6">Full Text Available From Springer Nature Mathematics and Statistics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings ent://SD_ILS/0/SD_ILS:1926237 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Tavares, Stafford. editor.&#160;Meijer, Henk. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540488927<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-48892-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings ent://SD_ILS/0/SD_ILS:1923679 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Harbison, William S. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540491354<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-49135-X">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842957 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Hutter, Michael. editor.&#160;Schmidt, J&ouml;rn-Marc. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642413322<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41332-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:1882498 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Heckman, Kristin E. author.&#160;Stech, Frank J. author.&#160;Thomas, Roshan K. author.&#160;Schmoker, Ben. author.&#160;Tsow, Alexander W. author.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319251332<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-25133-2">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:1882058 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9781461481904<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-8190-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:1884556 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Li, Kuan-Ching. editor.&#160;Chen, Xiaofeng. editor.&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811314834<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1483-4">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1843735 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Buchegger, Sonja. editor.&#160;Dam, Mads. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319265025<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-26502-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842893 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kutylowski, Miroslaw. editor. (orcid)0000-0003-3192-2430&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642385193<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-38519-3">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography - PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:1845779 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319765815<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-76581-5">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography - PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:1845883 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319765785<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-76578-5">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:1882823 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lu, Rongxing. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319328997<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32899-7">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842627 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Bonneau, Joseph. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642417177<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41717-7">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:1843840 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lehmann, Anja. editor.&#160;Wolf, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319174709<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-17470-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:1844437 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Brumley, Billy Bob. editor.&#160;R&ouml;ning, Juha. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319475608<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-47560-8">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Protection in Information Processing Systems IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France ent://SD_ILS/0/SD_ILS:1924558 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Deswarte, Yves. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Wang, Lingyu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9781402081439<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b98992">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Cryptography Introducing Mathematical and Algorithmic Foundations ent://SD_ILS/0/SD_ILS:1887083 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Buell, Duncan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783030734923<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-73492-3">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications ent://SD_ILS/0/SD_ILS:1883516 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Palomares Carrascosa, Iv&aacute;n. editor.&#160;Kalutarage, Harsha Kumara. editor.&#160;Huang, Yan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D343<br/>ISBN&#160;9783319594392<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-59439-2">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:1845484 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Shacham, Hovav. editor.&#160;Boldyreva, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319968810<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-96881-0">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:1845590 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Shacham, Hovav. editor.&#160;Boldyreva, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319968780<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-96878-0">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:1882155 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662447574<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-44757-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:1881557 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Du, Suguo. author.&#160;Zhu, Haojin. author. (orcid)0000-0001-5079-4556&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9781461493570<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-9357-0">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:1882774 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Conti, Mauro. author. (orcid)0000-0002-3612-1934&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9781493934607<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-3460-7">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:1881567 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9781461489962<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-8996-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Personal Medical Information Security, Engineering, and Ethics ent://SD_ILS/0/SD_ILS:1927808 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Anderson, Ross. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642590238<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-59023-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:1882189 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319087443<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-08744-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology Proceedings of CRYPTO '84 ent://SD_ILS/0/SD_ILS:1926305 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Blakely, G.R. editor.&#160;Chaum, D. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540395683<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-39568-7">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> A Guide to Data Compression Methods ent://SD_ILS/0/SD_ILS:1924371 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A73<br/>ISBN&#160;9780387217086<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-21708-6">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:1882721 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Li, Yingjiu. author.&#160;Yan, Qiang. author.&#160;Deng, Robert H. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319175034<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-17503-4">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842737 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642380044<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-38004-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5-7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1885450 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Gueye, Cheikh Thiecoumba. editor.&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Cayrel, Pierre-Louis. editor.&#160;Buchmann, Johannes. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>ISBN&#160;9783030362379<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-36237-9">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Statistical Steganalysis ent://SD_ILS/0/SD_ILS:1880367 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;B&ouml;hme, Rainer. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .A65<br/>ISBN&#160;9783642143137<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-14313-7">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:1844580 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Takagi, Tsuyoshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319293608<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-29360-8">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843470 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783662438268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-43826-8">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843926 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.&#160;Fong, Philip W. L. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319170404<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-17040-4">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1883921 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9789811329074<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-2907-4">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843526 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319120874<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-12087-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:1880959 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;van Tilborg, Henk C.A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D35<br/>ISBN&#160;9781441959065<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4419-5906-5">Full Text Available From Springer Nature Computer Science 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro Cryptography and Cryptanalysis with C++20 Creating and Programming Advanced Algorithms ent://SD_ILS/0/SD_ILS:1878883 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mihailescu, Marius Iulian. author.&#160;Nita, Stefania Loredana. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.7 -.73<br/>ISBN&#160;9781484265864<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6586-4">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security in Financial Services ent://SD_ILS/0/SD_ILS:1965068 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Slater, Ken. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HD62.4 -62.45<br/>ISBN&#160;9781349122158<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12215-8">Full Text Available From Palgrave Economics & Finance Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Gr&ouml;bner Bases, Coding, and Cryptography ent://SD_ILS/0/SD_ILS:1888841 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Sala, Massimiliano. editor.&#160;Mora, Teo. editor.&#160;Perret, Ludovic. editor.&#160;Sakata, Shojiro. editor.&#160;Traverso, Carlo. editor.<br/>Yer Numarası&#160;QA150 -272<br/>ISBN&#160;9783540938064<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-93806-4">Full Text Available From Springer Nature Mathematics and Statistics 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:1810330 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Forte, Domenic. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>ISBN&#160;9783319490199<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-49019-9">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:1843754 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Oswald, Elisabeth. editor.&#160;Fischlin, Marc. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662468036<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-46803-6">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1882597 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Thuraisingham, Bhavani. editor.&#160;Wang, XiaoFeng. editor. (orcid)0000-0002-0607-4946&#160;Yegneswaran, Vinod. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319288659<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-28865-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:1924723 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A73<br/>ISBN&#160;9783642860928<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-86092-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Provable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings ent://SD_ILS/0/SD_ILS:1886911 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Huang, Qiong. editor.&#160;Yu, Yu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030904029<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-90402-9">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843245 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319116594<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11659-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27-29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:1884700 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372&#160;Campilho, Aur&eacute;lio. editor. (orcid)0000-0002-5317-6275&#160;Yu, Alfred. editor. (orcid)0000-0002-8604-0219&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TA1634<br/>ISBN&#160;9783030272029<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-27202-9">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842631 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Accorsi, Rafael. editor.&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783642410987<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41098-7">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:1843804 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Oswald, Elisabeth. editor.&#160;Fischlin, Marc. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662468005<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-46800-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843314 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642546310<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-54631-0">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography -- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1842895 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783642363344<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36334-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1845130 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lange, Tanja. editor.&#160;Takagi, Tsuyoshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319598796<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-59879-6">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation ent://SD_ILS/0/SD_ILS:1893567 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;D&iacute;az Cardell, Sara. author.&#160;F&uacute;ster-Sabater, Amparo. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA297.4<br/>ISBN&#160;9783030128500<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-12850-0">Full Text Available From Springer Nature Mathematics and Statistics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Lattices Applied to Coding for Reliable and Secure Communications ent://SD_ILS/0/SD_ILS:1892643 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Costa, Sueli I.R. author.&#160;Oggier, Fr&eacute;d&eacute;rique. author.&#160;Campello, Antonio. author.&#160;Belfiore, Jean-Claude. author.&#160;Viterbo, Emanuele. author.<br/>Yer Numarası&#160;QA639.5 -640.7<br/>ISBN&#160;9783319678825<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-67882-5">Full Text Available From Springer Nature Mathematics and Statistics 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Chaos-based Cryptography Theory, Algorithms and Applications ent://SD_ILS/0/SD_ILS:1818113 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>ISBN&#160;9783642205422<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-20542-2">Full Text Available From Springer Nature Engineering 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845569 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319769530<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-76953-0">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:1838425 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Dobbertin, Hans. editor.&#160;Rijmen, Vincent. editor.&#160;Sowa, Aleksandra. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540318408<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b137765">Full Text Available From Springer Nature Computer Science 2005 Packages</a><br/>Format:&#160;Electronic Resources<br/> Replication Theory and Practice ent://SD_ILS/0/SD_ILS:1840851 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Charron-Bost, Bernadette. editor.&#160;Pedone, Fernando. editor.&#160;Schiper, Andre. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.6 -76.66<br/>ISBN&#160;9783642112942<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-11294-2">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> ADO Examples and Best Practices ent://SD_ILS/0/SD_ILS:1946040 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Vaughn, William R. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .C65<br/>ISBN&#160;9781430211563<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-1156-3">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845384 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623&#160;Assaf, Tareq. editor.&#160;Giannaccini, Maria Elena. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>ISBN&#160;9783319967288<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-96728-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Number Theory 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002. Proceedings ent://SD_ILS/0/SD_ILS:1925160 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Fieker, Claus. editor.&#160;Kohel, David R. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA241 -247.5<br/>ISBN&#160;9783540454557<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-45455-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> SEMPER - Secure Electronic Marketplace for Europe ent://SD_ILS/0/SD_ILS:1927742 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Lacoste, Gerard. editor.&#160;Pfitzmann, Birgit. editor.&#160;Steiner, Michael. editor.&#160;Waidner, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783540449270<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b75215">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Ethical and Secure Computing A Concise Module ent://SD_ILS/0/SD_ILS:1885257 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .C66<br/>ISBN&#160;9783030039370<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03937-0">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:1882377 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Wen, Mi. author.&#160;Lu, Rongxing. author.&#160;Liang, Xiaohui. author.&#160;Lei, Jingsheng. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319063553<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-06355-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Construction and Analysis of Cryptographic Functions ent://SD_ILS/0/SD_ILS:1882191 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Budaghyan, Lilya. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319129914<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-12991-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> EUROCODE '90 International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990. Proceedings ent://SD_ILS/0/SD_ILS:1924239 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Cohen, Gerard. editor.&#160;Charpin, Pascale. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540475460<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/3-540-54303-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Feistel Ciphers Security Proofs and Cryptanalysis ent://SD_ILS/0/SD_ILS:1883396 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Nachef, Valerie. author.&#160;Patarin, Jacques. author.&#160;Volte, Emmanuel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319495309<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-49530-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843500 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783319048529<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-04852-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844390 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kim, Ho-won. editor.&#160;Choi, Dooho. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319318752<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31875-2">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843100 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319120607<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-12060-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Random Curves Journeys of a Mathematician ent://SD_ILS/0/SD_ILS:1888349 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Koblitz, Neal. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA21 -27<br/>ISBN&#160;9783540740780<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-74078-0">Full Text Available From Springer Nature Mathematics and Statistics 2008 Packages</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Number Theory Third International Symposium, ANTS-III, Portland, Orgeon, USA, June 21-25, 1998, Proceedings ent://SD_ILS/0/SD_ILS:1927088 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Buhler, Joe P. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>ISBN&#160;9783540691136<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/BFb0054849">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Transformation for a Sustainable Society in the 21st Century I3E 2019 IFIP WG 6.11 International Workshops, Trondheim, Norway, September 18-20, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1885965 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Pappas, Ilias O. editor.&#160;Mikalef, Patrick. editor. (orcid)0000-0002-6788-2277&#160;Dwivedi, Yogesh K. editor. (orcid)0000-0002-5547-9990&#160;Jaccheri, Letizia. editor. (orcid)0000-0002-5547-2270&#160;Krogstie, John. editor.<br/>Yer Numarası&#160;QA76.76 .A65<br/>ISBN&#160;9783030396343<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-39634-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:1844175 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783662467398<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-46739-8">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843948 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Rhee, Kyung-Hyune. editor.&#160;Yi, Jeong Hyun. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319150871<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-15087-1">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Artificial Intelligence and Blockchain Technology ent://SD_ILS/0/SD_ILS:1886327 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Kumar, R.Lakshmana. editor.&#160;Wang, Yichuan. editor. (orcid)0000-0003-1575-0245&#160;Poongodi, T. editor. (orcid)0000-0001-8726-4997&#160;Imoize, Agbotiname Lucky. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>ISBN&#160;9783030741501<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-74150-1">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1843596 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;Foresti, Sara. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783319248585<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-24858-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845991 2024-11-10T06:19:06Z 2024-11-10T06:19:06Z Yazar&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>ISBN&#160;9783030393038<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-39303-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/>