Search Results for Systems Theory. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-22T23:00:43Z Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 L5 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology and Application 7th CCF China Blockchain Conference, CBCC 2024, Shanghai, China, December 13-15, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608895 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Zhu, Liehuang. editor.&#160;Sun, Yi. editor.&#160;Zhu, Jianming. editor.&#160;Wu, Qianhong. editor.&#160;Song, Xianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6232-6">https://doi.org/10.1007/978-981-96-6232-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology and Application 7th CCF China Blockchain Conference, CBCC 2024, Shanghai, China, December 13-15, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608914 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Zhu, Liehuang. editor.&#160;Sun, Yi. editor.&#160;Zhu, Jianming. editor.&#160;Wu, Qianhong. editor.&#160;Song, Xianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6243-2">https://doi.org/10.1007/978-981-96-6243-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606674 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Xenakis, Christos. editor. (orcid)0000-0001-6718-122X&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8798-2">https://doi.org/10.1007/978-981-97-8798-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606675 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Xenakis, Christos. editor. (orcid)0000-0001-6718-122X&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8801-9">https://doi.org/10.1007/978-981-97-8801-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611756 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Xu, Ming. editor.&#160;Qin, Zheng. editor.&#160;Yan, Fei. editor.&#160;Fu, Shaojing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617961 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Christianson, Bruce. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:613189 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Robshaw, Matthew. editor.&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:615975 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Robshaw, Matthew. editor.&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616300 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Robshaw, Matthew. editor.&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616726 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Foresti, Sara. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithmic cryptanalysis ent://SD_ILS/0/SD_ILS:546057 2026-03-22T23:00:43Z 2026-03-22T23:00:43Z Author&#160;Joux, Antoine., author.<br/>Preferred Shelf Number&#160;QA76.9 .A43 J693 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>