Search Results for Information Systems. - Narrowed by: Electronic Library - 2012 - Computational complexity. - Computer software. - Information Systems.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bSystems.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-09-10T08:13:52ZAdvances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1965882024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Pointcheval, David. editor. Johansson, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthdayent://SD_ILS/0/SD_ILS:1964282024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequences and Their Applications – SETA 2012 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1969282024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Helleseth, Tor. editor. Jedwab, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30615-0">http://dx.doi.org/10.1007/978-3-642-30615-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Joint International Conference, FAW-AAIM 2012, Beijing, China, May 14-16, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1967512024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Snoeyink, Jack. editor. Lu, Pinyan. editor. Su, Kaile. editor. Wang, Lusheng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29700-7">http://dx.doi.org/10.1007/978-3-642-29700-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public Key Cryptography – PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1968222024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Fischlin, Marc. editor. Buchmann, Johannes. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1971532024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1974642024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Canteaut, Anne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975572024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Galbraith, Steven. editor. Nandi, Mridul. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-09-10T08:13:52Z2024-09-10T08:13:52ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>