Search Results for Cryptography. - Narrowed by: 2013SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ic$003dtrue$0026ps$003d300?2024-11-06T00:29:30ZAlgebraic curves in cryptographyent://SD_ILS/0/SD_ILS:2906692024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Ling, San, 1964- Wang, Huaxiong. Xing, Chaoping, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420079470">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public key cryptography applications and attacksent://SD_ILS/0/SD_ILS:2493422024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Batten, Lynn Margaret.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Cryptography with Mapleent://SD_ILS/0/SD_ILS:3335332024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Gómez Pardo, José Luis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333533.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3340222024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Iwama, Kazuo. editor. Kawano, Yasuhito. editor. Murao, Mio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346352024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347072024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348632024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3349382024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthdayent://SD_ILS/0/SD_ILS:3351542024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:2862522024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Patil, Harsh Kupwade. Szygenda, Stephen A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3341792024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341842024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351972024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350882024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335088.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Modern Cryptography Primer Theoretical Foundations and Practical Applicationsent://SD_ILS/0/SD_ILS:3350992024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3340972024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3342422024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350762024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Gierlichs, Benedikt. editor. Guilley, Sylvain. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335076.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of finite fieldsent://SD_ILS/0/SD_ILS:2916732024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Mullen, Gary L. Panario, Daniel, 1959-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439873823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the CISSP CBKent://SD_ILS/0/SD_ILS:2917432024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Tipton, Harold F., editor of compilation. Hernandez, Steven, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466569782">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer security literacy staying safe in a digital worldent://SD_ILS/0/SD_ILS:2908392024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Jacobson, Douglas. Idziorek, Joseph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582024-11-06T00:29:30Z2024-11-06T00:29:30ZAuthor Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>