Search Results for Cryptography. - Narrowed by: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-27T17:36:14ZCryptography for developersent://SD_ILS/0/SD_ILS:1476862024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor St. Denis, Tom. Johnson, Simon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>An introduction to cryptographyent://SD_ILS/0/SD_ILS:2894082024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420011241">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:2968652024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>An introduction to cryptographyent://SD_ILS/0/SD_ILS:1105952024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Mollin, Richard A., 1947-<br/>Preferred Shelf Number QA268 .M65 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:1851852024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless security and cryptography specifications and implementationsent://SD_ILS/0/SD_ILS:2875042024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849387692">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:1694372024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Garcia, Arnaldo. editor. Stichtenoth, Henning. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878512024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Adams, Carlisle. editor. Miri, Ali. editor. Wiener, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1861072024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Vadhan, Salil P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1863402024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Okamoto, Tatsuaki. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1866402024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Katz, Jonathan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pairing-Based Cryptography – Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868682024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Takagi, Tsuyoshi. editor. Okamoto, Tatsuaki. editor. Okamoto, Eiji. editor. Okamoto, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:1871652024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Biham, Eli. editor. Youssef, Amr M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1878272024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Galbraith, Steven D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:1878542024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Dietrich, Sven. editor. Dhamija, Rachna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:1853682024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:2877632024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Moldovyan, Nick. Moldovyan, Alex.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1455322024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Leeuw, Karl de. Bergstra, J. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied cryptanalysis breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:2495082024-11-27T17:36:14Z2024-11-27T17:36:14ZAuthor Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>