Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Log In
|
My Account
|
My Lists
|
Send a Request
|
Select Language
English
Türkçe
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Ferit Melen Library
Ilahiyat Library
IIBF Library
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
15
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Publication Date: 2012
Author
Include
Exclude
Mu, Yi. editor.
(2)
SpringerLink (Online service)
(2)
Bertino, Elisa. editor.
(1)
Seberry, Jennifer. editor.
(1)
Susilo, Willy. editor. (orcid)0000-0002-1562-5105
(1)
Xu, Li. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(2)
Subject
Include
Exclude
Cryptography.
(2)
Cryptology.
(2)
Data and Information Security.
(2)
Data encryption (Computer science).
(2)
Data protection.
(2)
Electronic commerce.
(2)
Electronic data processing-Management.
(2)
IT Operations.
(2)
e-Commerce and e-Business.
(2)
Coding and Information Theory.
(1)
Coding theory.
(1)
Computer Application in Administrative Data Processing.
(1)
Computer Communication Networks.
(1)
Computer networks .
(1)
Database management.
(1)
Information technology-Management.
(1)
Information theory.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Springer E-Book Collection
Library
Include
Exclude
Ferit Melen Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
2 Results Found
1
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
by
Susilo, Willy. editor. (orcid)0000-0002-1562-5105
https://doi.org/10.1007/978-3-642-31448-3
Format:
Excerpt:
Mu, Yi. editor.
Marc View
SD_ILS:150944
2.
Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
by
Xu, Li. editor.
https://doi.org/10.1007/978-3-642-34601-9
Format:
Excerpt:
Mu, Yi. editor.
Marc View
SD_ILS:173511
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
Go to:
Search Results
|
Search Facets
|
Top of Page