Arama Sonuçları Cryptography - Daraltılmış: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-29T16:37:58ZGroup-based Cryptographyent://SD_ILS/0/SD_ILS:1981572024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Myasnikov, Alexei. author. Ushakov, Alexander. author. Shpilrain, Vladimir. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Number Story From Counting to Cryptographyent://SD_ILS/0/SD_ILS:1756652024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Higgins, Peter M. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information theory, coding and cryptographyent://SD_ILS/0/SD_ILS:3861372024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Bose, Ranjan.<br/>Yer Numarası QA268 B743 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Elliptic curves number theory and cryptographyent://SD_ILS/0/SD_ILS:2887102024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Washington, Lawrence C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:1675452024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1890442024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1892412024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Kawano, Yasuhito. editor. Mosca, Michele. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1886452024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Tsudik, Gene. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1887162024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1887922024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Ostrovsky, Rafail. editor. Prisco, Roberto. editor. Visconti, Ivan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes: An Introduction to Information Communication and Cryptographyent://SD_ILS/0/SD_ILS:1757912024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Biggs, N.L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeitingent://SD_ILS/0/SD_ILS:1863332024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Cole, Peter H. editor. Ranasinghe, Damith C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1881302024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Cramer, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1881592024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Canetti, Ran. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Dube, Roger. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1856472024-11-29T16:37:58Z2024-11-29T16:37:58ZYazar Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>