Search Results for Cryptography. - Narrowed by: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-12T04:05:05ZCryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1724552024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, Automata and Learning Theoryent://SD_ILS/0/SD_ILS:3655412024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Thomas, D. Gnanaraj, ed. lit. Jeyanthi, P. Abisha, ed. lit.<br/>Preferred Shelf Number QA76.9.A25 C79 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Chaos-Based Cryptography Theory,Algorithms and Applicationsent://SD_ILS/0/SD_ILS:1944082024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Kocarev, Ljupco. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:3038382024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1937962024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Dam, Wim. editor. Kendon, Vivien M. editor. Severini, Simone. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1940862024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Ishai, Yuval. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public Key Cryptography – PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1940242024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Catalano, Dario. editor. Fazio, Nelly. editor. Gennaro, Rosario. editor. Nicolosi, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1940872024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Biryukov, Alex. editor. Gong, Guang. editor. Stinson, Douglas R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1947382024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckermanent://SD_ILS/0/SD_ILS:1951002024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Goldreich, Oded. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959372024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Yang, Bo-Yin. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959672024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nonlinear laser dynamics from quantum dots to cryptographyent://SD_ILS/0/SD_ILS:3061412024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Lüdge, Kathy. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Block Cipher Companionent://SD_ILS/0/SD_ILS:1935732024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1469222024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Heiderich, Mario.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2869752024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)[superscript 2] guide to the ISSAP CBKent://SD_ILS/0/SD_ILS:2887942024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439800980">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:2712432024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Ballad, Bill. Ballad, Tricia. Banks, Erin K.<br/>Preferred Shelf Number TK5105.59 B353 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computational aspects of modular forms and Galois representations : how one can compute in polynomial time the value of Ramanujan's tau at a primeent://SD_ILS/0/SD_ILS:3754622024-11-12T04:05:05Z2024-11-12T04:05:05ZAuthor Couveignes, Jean-Marc. Edixhoven, B. (Bas), 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7rzmb">http://www.jstor.org/stable/10.2307/j.ctt7rzmb</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>