Search Results for Mathematical analysis - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematical$002banalysis$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-11T12:34:02ZAISMA-2024: International Workshop on Advanced Information Security Management and Applicationsent://SD_ILS/0/SD_ILS:6055562026-04-11T12:34:02Z2026-04-11T12:34:02ZAuthor Lapina, Maria. editor. (orcid)0000-0001-8117-9142 Raza, Zahid. editor. (orcid)0000-0003-1906-6774 Tchernykh, Andrei. editor. (orcid)0000-0001-5029-5212 Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332 Zolotarev, Vyacheslav. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-72171-7">https://doi.org/10.1007/978-3-031-72171-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:6137592026-04-11T12:34:02Z2026-04-11T12:34:02ZAuthor Blömer, Johannes. editor. Kotsireas, Ilias S. editor. Kutsia, Temur. editor. (orcid)0000-0003-4084-7380 Simos, Dimitris E. editor. (orcid)0000-0001-8588-1924 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:6173192026-04-11T12:34:02Z2026-04-11T12:34:02ZAuthor Rak, Jacek. editor. Bay, John. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 Popyack, Leonard. editor. Skormin, Victor. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:6161442026-04-11T12:34:02Z2026-04-11T12:34:02ZAuthor Cheon, Jung Hee. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6168102026-04-11T12:34:02Z2026-04-11T12:34:02ZAuthor Cheon, Jung Hee. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>