Search Results for Quantum Information. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dQuantum$002bInformation.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-05-16T19:36:14Z Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-05-16T19:36:14Z 2026-05-16T19:36:14Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-05-16T19:36:14Z 2026-05-16T19:36:14Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-05-16T19:36:14Z 2026-05-16T19:36:14Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-05-16T19:36:14Z 2026-05-16T19:36:14Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-05-16T19:36:14Z 2026-05-16T19:36:14Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>