Search Results for Cryptography. - Narrowed by: 2010
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026te$003dILS$0026ps$003d300?
2024-11-12T03:30:22Z
Applied Quantum Cryptography
ent://SD_ILS/0/SD_ILS:191072
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Kollmitzer, Christian. editor. Pivk, Mario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04831-9">http://dx.doi.org/10.1007/978-3-642-04831-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:287829
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Rosenberg, Burton.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192187
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Nguyen, Phong Q. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192838
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Sion, Radu. editor. Curtmola, Reza. editor. Dietrich, Sven. editor. Kiayias, Aggelos. editor. Miret, Josep M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193606
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Joye, Marc. editor. Miyaji, Atsuko. editor. Otsuka, Akira. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography A Textbook for Students and Practitioners
ent://SD_ILS/0/SD_ILS:190836
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Paar, Christof. author. Pelzl, Jan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191801
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Micciancio, Daniele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Information, Computation and Cryptography An Introductory Survey of Theory, Technology and Experiments
ent://SD_ILS/0/SD_ILS:191835
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Benatti, Fabio. editor. Fannes, Mark. editor. Floreanini, Roberto. editor. Petritis, Dimitri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11914-9">http://dx.doi.org/10.1007/978-3-642-11914-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192157
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192420
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192701
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Sion, Radu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14577-3">http://dx.doi.org/10.1007/978-3-642-14577-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192932
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Garay, Juan A. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Signcryption
ent://SD_ILS/0/SD_ILS:189264
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The LLL Algorithm Survey and Applications
ent://SD_ILS/0/SD_ILS:190278
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Statistical Steganalysis
ent://SD_ILS/0/SD_ILS:192611
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Böhme, Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Locally Decodable Codes and Private Information Retrieval Schemes
ent://SD_ILS/0/SD_ILS:192626
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Towards Hardware-Intrinsic Security Foundations and Practice
ent://SD_ILS/0/SD_ILS:192659
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:291418
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Hinek, M. Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:126135
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Brown, Dan, 1964- Soner, Sezer.<br/>Preferred Shelf Number PS 3552.R685434 D542 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the CISSP CBK
ent://SD_ILS/0/SD_ILS:286898
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Tipton, Harold F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 4
ent://SD_ILS/0/SD_ILS:289735
2024-11-12T03:30:22Z
2024-11-12T03:30:22Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>