Search Results for Cryptography - Narrowed by: 2006 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ic$003dtrue$0026ps$003d300? 2025-12-13T03:28:34Z Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:543504 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;TK5102.94 .Q36 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of elliptic and hyperelliptic curve cryptography ent://SD_ILS/0/SD_ILS:547539 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Cohen, Henri.&#160;Frey, Gerhard, 1944-&#160;Avanzi, Roberto.<br/>Preferred Shelf Number&#160;QA567.2 .E44 H36 2006 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420034981">https://www.taylorfrancis.com/books/9781420034981</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367801625">https://www.taylorfrancis.com/books/9780367801625</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184658 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Prisco, Roberto. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:180834 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Schroeder, Manfred R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183489 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Halevi, Shai. editor.&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183624 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Preneel, Bart. editor.&#160;Tavares, Stafford. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184267 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Ytrehus, &Oslash;yvind. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183856 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Yung, Moti. editor.&#160;Dodis, Yevgeniy. editor.&#160;Kiayias, Aggelos. editor.&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184906 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Breveglieri, Luca. editor.&#160;Koren, Israel. editor.&#160;Naccache, David. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:184908 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Crescenzo, Giovanni. editor.&#160;Rubin, Avi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:183559 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Rosen, Alon. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Chaos in automatic control ent://SD_ILS/0/SD_ILS:540494 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Barbot, Jean Pierre, 1958-&#160;Perruquetti, Wilfrid.<br/>Preferred Shelf Number&#160;TJ213 .C468 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420027853">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)[superscript]2 guide to the CISSP-ISSEP CBK ent://SD_ILS/0/SD_ILS:542243 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Hansche, Susan., author.<br/>Preferred Shelf Number&#160;QA76.3 .H364 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135483098">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Authentication codes and combinatorial designs ent://SD_ILS/0/SD_ILS:547049 2025-12-13T03:28:34Z 2025-12-13T03:28:34Z Author&#160;Pei, Dingyi., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P42 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>