Search Results for Pei, Dingyi.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPei$00252C$002bDingyi.$0026ic$003dtrue$0026ps$003d300?
2024-11-06T16:38:09Z
Authentication codes and combinatorial designs
ent://SD_ILS/0/SD_ILS:284659
2024-11-06T16:38:09Z
2024-11-06T16:38:09Z
Author Pei, Dingyi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003185">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188456
2024-11-06T16:38:09Z
2024-11-06T16:38:09Z
Author Pei, Dingyi. editor. Yung, Moti. editor. Lin, Dongdai. editor. Wu, Chuankun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modular Forms with Integral and Half-Integral Weights
ent://SD_ILS/0/SD_ILS:196665
2024-11-06T16:38:09Z
2024-11-06T16:38:09Z
Author Wang, Xueli. author. Pei, Dingyi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29302-3">http://dx.doi.org/10.1007/978-3-642-29302-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>