Arama Sonuçları Cryptography - Daraltılmış: Data mining.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography$0026qf$003dSUBJECT$002509Konu$002509Data$002bmining.$002509Data$002bmining.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2024-11-30T01:48:33Z
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399450
2024-11-30T01:48:33Z
2024-11-30T01:48:33Z
Yazar Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2024-11-30T01:48:33Z
2024-11-30T01:48:33Z
Yazar Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>