Arama Sonuçları Computer security - Daraltılmış: Computer science—Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience$0025E2$002580$002594Mathematics.$002509Computer$002bscience$0025E2$002580$002594Mathematics.$0026ic$003dtrue$0026ps$003d300?2024-11-14T12:30:16ZGraphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papersent://SD_ILS/0/SD_ILS:4827092024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810 Horne, Ross. editor. (orcid)0000-0003-0162-1901 Probst, Christian W. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:4857762024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Joux, Antoine. editor. Youssef, Amr. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890162024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:4882332024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Donovan, Peter. author. Mack, John. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:4850612024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Hameurlain, Abdelkader. editor. Küng, Josef. editor. Wagner, Roland. editor. Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Thoai, Nam. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4858422024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Chen, Liqun. editor. Mitchell, Chris. editor. (orcid)0000-0002-6118-0055 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:4888842024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part IIent://SD_ILS/0/SD_ILS:4889562024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889752024-11-14T12:30:16Z2024-11-14T12:30:16ZYazar Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>