Arama Sonu&ccedil;lar&#305; Collision. - Daralt&#305;lm&#305;&#351;: 2015 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCollision.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026pe$003dd$00253A$0026ps$003d300?dt=list 2024-12-27T06:03:41Z Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519134 2024-12-27T06:03:41Z 2024-12-27T06:03:41Z Yazar&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519134.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518785 2024-12-27T06:03:41Z 2024-12-27T06:03:41Z Yazar&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518785.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Runtime Verification 6th International Conference, RV 2015, Vienna, Austria, September 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519135 2024-12-27T06:03:41Z 2024-12-27T06:03:41Z Yazar&#160;Bartocci, Ezio. editor.&#160;Majumdar, Rupak. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519135.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-23820-3">https://doi.org/10.1007/978-3-319-23820-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519232 2024-12-27T06:03:41Z 2024-12-27T06:03:41Z Yazar&#160;Lee, Jooyoung. editor.&#160;Kim, Jongsung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519232.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15943-0">https://doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tools and Algorithms for the Construction and Analysis of Systems 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519090 2024-12-27T06:03:41Z 2024-12-27T06:03:41Z Yazar&#160;Baier, Christel. editor.&#160;Tinelli, Cesare. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519090.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-46681-0">https://doi.org/10.1007/978-3-662-46681-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>