Search Results for Data structures (Computer science) - Narrowed by: 2012 - Computer network architectures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-08-17T19:41:43Z Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation ent://SD_ILS/0/SD_ILS:196819 2024-08-17T19:41:43Z 2024-08-17T19:41:43Z Author&#160;Schneider, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30042-4">http://dx.doi.org/10.1007/978-3-642-30042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2024-08-17T19:41:43Z 2024-08-17T19:41:43Z Author&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-08-17T19:41:43Z 2024-08-17T19:41:43Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Protocol Security Analysis Based on Trusted Freshness ent://SD_ILS/0/SD_ILS:195536 2024-08-17T19:41:43Z 2024-08-17T19:41:43Z Author&#160;Dong, Ling. author.&#160;Chen, Kefei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>