Search Results for Mathematics. - Narrowed by: Electronic Library - Coding theory. - Computer science.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematics.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2024-09-08T09:13:04Z
Mathematics in Computing An Accessible Guide to Historical, Foundational and Application Contexts
ent://SD_ILS/0/SD_ILS:331002
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author O’Regan, Gerard. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331002.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4534-9">http://dx.doi.org/10.1007/978-1-4471-4534-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary Cryptology
ent://SD_ILS/0/SD_ILS:197889
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Catalano, Dario. author. Cramer, Ronald. author. Crescenzo, Giovanni. author. Darmgård, Ivan. author. Pointcheval, David. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487274
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Schmidt, Kai-Uwe. editor. Winterhof, Arne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theory, Combinatorics, and Search Theory In Memory of Rudolf Ahlswede
ent://SD_ILS/0/SD_ILS:334319
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Aydinian, Harout. editor. Cicalese, Ferdinando. editor. Deppe, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334319.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36899-8">http://dx.doi.org/10.1007/978-3-642-36899-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334022
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Iwama, Kazuo. editor. Kawano, Yasuhito. editor. Murao, Mio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes and Turbo Codes
ent://SD_ILS/0/SD_ILS:176530
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Berrou, Claude. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-8178-0039-4">http://dx.doi.org/10.1007/978-2-8178-0039-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes et turbocodes
ent://SD_ILS/0/SD_ILS:176368
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Berrou, Claude. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-287-32740-7">http://dx.doi.org/10.1007/978-2-287-32740-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decrypted Secrets Methods and Maxims of Cryptology
ent://SD_ILS/0/SD_ILS:185053
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Bauer, Friedrich L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetry: The Foundation of Information
ent://SD_ILS/0/SD_ILS:185926
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Muller, Scott J. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69884-5">http://dx.doi.org/10.1007/978-3-540-69884-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Brute Force Cracking the Data Encryption Standard
ent://SD_ILS/0/SD_ILS:151956
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Curtin, Matt. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2024-09-08T09:13:04Z
2024-09-08T09:13:04Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>