Search Results for Mathematics. - Narrowed by: SpringerLink (Online service) - 2005 - Computer science. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematics.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300? 2024-09-07T11:50:55Z Contemporary Cryptology ent://SD_ILS/0/SD_ILS:197889 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Catalano, Dario. author.&#160;Cramer, Ronald. author.&#160;Crescenzo, Giovanni. author.&#160;Darmg&aring;rd, Ivan. author.&#160;Pointcheval, David. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:168883 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Kowalik, Janusz S. editor.&#160;Gorski, Janusz. editor.&#160;Sachenko, Anatoly. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codici Cifrati Arne Beurling e la crittografia nella II guerra mondiale ent://SD_ILS/0/SD_ILS:204126 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Beckman, Bengt. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/88-470-0395-4">http://dx.doi.org/10.1007/88-470-0395-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Programmieren mit Java Eine grundlegende Einf&uuml;hrung f&uuml;r Informatiker und Ingenieure ent://SD_ILS/0/SD_ILS:180995 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Pepper, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b138115">http://dx.doi.org/10.1007/b138115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:165165 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Sasaki, Ryoichi. editor.&#160;Qing, Sihan. editor.&#160;Okamoto, Eiji. editor.&#160;Yoshiura, Hiroshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-09-07T11:50:55Z 2024-09-07T11:50:55Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>