Search Results for Computational complexity. - Narrowed by: 2009 - Computational complexity. - Computer science. - Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputational$002bcomplexity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?2024-09-04T23:37:56ZTheory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1896932024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Reingold, Omer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papersent://SD_ILS/0/SD_ILS:1908552024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1910122024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1897872024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1906002024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Halevi, Shai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1914912024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1915002024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Cryptology – CT-RSA 2009 The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1898152024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Fischlin, Marc. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00862-7">http://dx.doi.org/10.1007/978-3-642-00862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1898522024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01001-9">http://dx.doi.org/10.1007/978-3-642-01001-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1903062024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909502024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1912732024-09-04T23:37:56Z2024-09-04T23:37:56ZAuthor Jacobson, Michael J. editor. Rijmen, Vincent. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>