Search Results for Data Encryption. - Narrowed by: Applications of Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Applications$002bof$002bMathematics.$002509Applications$002bof$002bMathematics.$0026ps$003d300?dt=list2024-12-20T06:12:27ZAdvances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-12-20T06:12:27Z2024-12-20T06:12:27ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-12-20T06:12:27Z2024-12-20T06:12:27ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>