Search Results for Cryptography. - Narrowed by: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300?2024-11-19T00:41:36ZGroup-based Cryptographyent://SD_ILS/0/SD_ILS:1981572024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Myasnikov, Alexei. author. Ushakov, Alexander. author. Shpilrain, Vladimir. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:1675452024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Number Story From Counting to Cryptographyent://SD_ILS/0/SD_ILS:1756652024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Higgins, Peter M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Elliptic curves number theory and cryptographyent://SD_ILS/0/SD_ILS:2887102024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Washington, Lawrence C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information theory, coding and cryptographyent://SD_ILS/0/SD_ILS:3861372024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Bose, Ranjan.<br/>Preferred Shelf Number QA268 B743 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Codes: An Introduction to Information Communication and Cryptographyent://SD_ILS/0/SD_ILS:1757912024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Biggs, N.L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1856472024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1881592024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1890442024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1881302024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1886452024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1887162024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1887922024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Ostrovsky, Rafail. editor. Prisco, Roberto. editor. Visconti, Ivan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeitingent://SD_ILS/0/SD_ILS:1863332024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Cole, Peter H. editor. Ranasinghe, Damith C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1892412024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Kawano, Yasuhito. editor. Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-19T00:41:36Z2024-11-19T00:41:36ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>