Search Results for Cryptography -- History.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$002b--$002bHistory.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list2024-12-23T15:45:24ZHistory of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithmsent://SD_ILS/0/SD_ILS:4004242024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Dooley, John F. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5208662024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor El Hajji, Said. editor. Mesnager, Sihem. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520866.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5191342024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Katz, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519134.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5183862024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Bishop, Matt. editor. Miloslavskaya, Natalia. editor. Theocharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518386.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of finite fieldsent://SD_ILS/0/SD_ILS:2916732024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Mullen, Gary L. Panario, Daniel, 1959-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439873823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1455322024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Leeuw, Karl de. Bergstra, J. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052024-12-23T15:45:24Z2024-12-23T15:45:24ZAuthor Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>