Search Results for Cryptography. - Narrowed by: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300? 2024-11-19T00:41:36Z Group-based Cryptography ent://SD_ILS/0/SD_ILS:198157 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Myasnikov, Alexei. author.&#160;Ushakov, Alexander. author.&#160;Shpilrain, Vladimir. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:167545 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Silverman, J.H. author.&#160;Pipher, Jill. author.&#160;Hoffstein, Jeffrey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Story From Counting to Cryptography ent://SD_ILS/0/SD_ILS:175665 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Higgins, Peter M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elliptic curves number theory and cryptography ent://SD_ILS/0/SD_ILS:288710 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Washington, Lawrence C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188130 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188716 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Galbraith, Steven D. editor.&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188792 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Ostrovsky, Rafail. editor.&#160;Prisco, Roberto. editor.&#160;Visconti, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting ent://SD_ILS/0/SD_ILS:186333 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Cole, Peter H. editor.&#160;Ranasinghe, Damith C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189241 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Kawano, Yasuhito. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-19T00:41:36Z 2024-11-19T00:41:36Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>