Search Results for Cryptography. - Narrowed by: 2012 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026te$003dILS$0026ps$003d300? 2024-11-13T21:18:22Z Fault Analysis in Cryptography ent://SD_ILS/0/SD_ILS:196746 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Joye, Marc. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:299126 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Yan, Song Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:291582 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196791 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Danezis, George. editor.&#160;Dietrich, Sven. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:290796 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical and algorithmic foundations of the Internet ent://SD_ILS/0/SD_ILS:285212 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Luccio, Fabrizio, 1938-&#160;Pagli, Linda.&#160;Steel, Graham, 1977-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439831397">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic and stochastic coding theory ent://SD_ILS/0/SD_ILS:288122 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Kythe, Dave K.&#160;Kythe, Prem K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466505629">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defending whose country? indigenous soldiers in the Pacific war ent://SD_ILS/0/SD_ILS:241931 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;Riseman, Noah J.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780803246164/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kriptografi : &#351;ifrelerin matemati&#287;i ent://SD_ILS/0/SD_ILS:387338 2024-11-13T21:18:22Z 2024-11-13T21:18:22Z Author&#160;&Ccedil;imen, Canan&#160;Akleylek, Sedat.&#160;Aky&#305;ld&#305;z, Ersan.<br/>Preferred Shelf Number&#160;Z103 C56 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>