Search Results for Quantum theory. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dQuantum$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-03-15T08:39:43Z
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:609277
2026-03-15T08:39:43Z
2026-03-15T08:39:43Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:609291
2026-03-15T08:39:43Z
2026-03-15T08:39:43Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:609259
2026-03-15T08:39:43Z
2026-03-15T08:39:43Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-03-15T08:39:43Z
2026-03-15T08:39:43Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2026-03-15T08:39:43Z
2026-03-15T08:39:43Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>