Search Results for Mathematics. - Narrowed by: SpringerLink (Online service) - E-Book - Coding theory. - Computer science. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematics.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-07T13:50:41Z Mathematics in Computing An Accessible Guide to Historical, Foundational and Application Contexts ent://SD_ILS/0/SD_ILS:331002 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;O&rsquo;Regan, Gerard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4534-9">http://dx.doi.org/10.1007/978-1-4471-4534-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Contemporary Cryptology ent://SD_ILS/0/SD_ILS:197889 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Catalano, Dario. author.&#160;Cramer, Ronald. author.&#160;Crescenzo, Giovanni. author.&#160;Darmg&aring;rd, Ivan. author.&#160;Pointcheval, David. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487274 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Schmidt, Kai-Uwe. editor.&#160;Winterhof, Arne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theory, Combinatorics, and Search Theory In Memory of Rudolf Ahlswede ent://SD_ILS/0/SD_ILS:334319 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Aydinian, Harout. editor.&#160;Cicalese, Ferdinando. editor.&#160;Deppe, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334319.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36899-8">http://dx.doi.org/10.1007/978-3-642-36899-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes and Turbo Codes ent://SD_ILS/0/SD_ILS:176530 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Berrou, Claude. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-8178-0039-4">http://dx.doi.org/10.1007/978-2-8178-0039-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:185053 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Bauer, Friedrich L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes et turbocodes ent://SD_ILS/0/SD_ILS:176368 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Berrou, Claude. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-32740-7">http://dx.doi.org/10.1007/978-2-287-32740-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetry: The Foundation of Information ent://SD_ILS/0/SD_ILS:185926 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Muller, Scott J. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:151956 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Curtin, Matt.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-09-07T13:50:41Z 2024-09-07T13:50:41Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>