Arama Sonuçları Cryptography - Daraltılmış: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092011$0025092011$0026te$003dILS$0026ps$003d300?dt=list2024-12-26T02:09:52ZCryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptography, Automata and Learning Theoryent://SD_ILS/0/SD_ILS:3655412024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Thomas, D. Gnanaraj, ed. lit. Jeyanthi, P. Abisha, ed. lit.<br/>Yer Numarası QA76.9.A25 C79 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1724552024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Chaos-Based Cryptography Theory,Algorithms and Applicationsent://SD_ILS/0/SD_ILS:1944082024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Kocarev, Ljupco. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:3038382024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Davies, Joshua A. (Joshua Aaron)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Cryptography – PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1940242024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Catalano, Dario. editor. Fazio, Nelly. editor. Gennaro, Rosario. editor. Nicolosi, Antonio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckermanent://SD_ILS/0/SD_ILS:1951002024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Goldreich, Oded. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959672024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Chen, Liqun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1937962024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Dam, Wim. editor. Kendon, Vivien M. editor. Severini, Simone. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1940862024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Ishai, Yuval. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1940872024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Biryukov, Alex. editor. Gong, Guang. editor. Stinson, Douglas R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1947382024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959372024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Yang, Bo-Yin. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nonlinear laser dynamics from quantum dots to cryptographyent://SD_ILS/0/SD_ILS:3061412024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Lüdge, Kathy. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Block Cipher Companionent://SD_ILS/0/SD_ILS:1935732024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:2712432024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Ballad, Bill. Ballad, Tricia. Banks, Erin K.<br/>Yer Numarası TK5105.59 B353 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2869752024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript 2] guide to the ISSAP CBKent://SD_ILS/0/SD_ILS:2887942024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439800980">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1469222024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Heiderich, Mario.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational aspects of modular forms and Galois representations : how one can compute in polynomial time the value of Ramanujan's tau at a primeent://SD_ILS/0/SD_ILS:3754622024-12-26T02:09:52Z2024-12-26T02:09:52ZYazar Couveignes, Jean-Marc. Edixhoven, B. (Bas), 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.2307/j.ctt7rzmb">http://www.jstor.org/stable/10.2307/j.ctt7rzmb</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>