Search Results for Cryptography - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300? 2025-12-13T01:38:56Z Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:364648 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA241 K73 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:488413 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Baldi, Marco. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489063 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Bacon, Dave. editor.&#160;Martin-Delgado, Miguel. editor.&#160;Roetteler, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54429-3">https://doi.org/10.1007/978-3-642-54429-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:488308 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Pape, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;D810 .S7<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Elementary number theory ent://SD_ILS/0/SD_ILS:542156 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA241<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781498702690">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Chaotic signals in digital communications ent://SD_ILS/0/SD_ILS:547453 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Attux, Romis R., editor.&#160;Eisencraft, Marcio, editor.&#160;Suyama, Ricardo, editor.<br/>Preferred Shelf Number&#160;TK5102.9 .C4715 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466557239">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the ISSAP CBK ent://SD_ILS/0/SD_ILS:543523 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;Gordon, Adam.<br/>Preferred Shelf Number&#160;QA76.3 .H364 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466579019">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542740 2025-12-13T01:38:56Z 2025-12-13T01:38:56Z Author&#160;O'Hanley, Richard.&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;HD61 .I54 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466567528">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>