Search Results for - Narrowed by: English - 2010 - Coding theory. - Computational complexity. - Computer science. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-29T00:02:35Z Sequences and Their Applications &ndash; SETA 2010 6th International Conference, Paris, France, September 13-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193113 2024-08-29T00:02:35Z 2024-08-29T00:02:35Z Author&#160;Carlet, Claude. editor.&#160;Pott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15874-2">http://dx.doi.org/10.1007/978-3-642-15874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2024-08-29T00:02:35Z 2024-08-29T00:02:35Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192851 2024-08-29T00:02:35Z 2024-08-29T00:02:35Z Author&#160;Mangard, Stefan. editor.&#160;Standaert, Fran&ccedil;ois-Xavier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15031-9">http://dx.doi.org/10.1007/978-3-642-15031-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XI Special Issue on Security in Computing, Part II ent://SD_ILS/0/SD_ILS:193681 2024-08-29T00:02:35Z 2024-08-29T00:02:35Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17697-5">http://dx.doi.org/10.1007/978-3-642-17697-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193656 2024-08-29T00:02:35Z 2024-08-29T00:02:35Z Author&#160;Heng, Swee-Huay. editor.&#160;Wright, Rebecca N. editor.&#160;Goi, Bok-Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>