Search Results for Data structures (Computer science) - Narrowed by: 2012 - Computer network architectures. - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-09-11T19:42:23Z
Operational Semantics and Verification of Security Protocols
ent://SD_ILS/0/SD_ILS:188195
2024-09-11T19:42:23Z
2024-09-11T19:42:23Z
Author Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation
ent://SD_ILS/0/SD_ILS:196819
2024-09-11T19:42:23Z
2024-09-11T19:42:23Z
Author Schneider, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30042-4">http://dx.doi.org/10.1007/978-3-642-30042-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197636
2024-09-11T19:42:23Z
2024-09-11T19:42:23Z
Author Obaidat, Mohammad S. editor. Sevillano, José L. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Protocol Security Analysis Based on Trusted Freshness
ent://SD_ILS/0/SD_ILS:195536
2024-09-11T19:42:23Z
2024-09-11T19:42:23Z
Author Dong, Ling. author. Chen, Kefei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>