Search Results for Numerical analysis. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNumerical$002banalysis.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?2024-11-11T23:07:36ZDiscrete dynamical systems and chaotic machines theory and applicationsent://SD_ILS/0/SD_ILS:2917402024-11-11T23:07:36Z2024-11-11T23:07:36ZAuthor Bahi, Jacques Mohcine. Guyeux, Christophe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466554511">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4855452024-11-11T23:07:36Z2024-11-11T23:07:36ZAuthor Pointcheval, David. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>