Arama Sonu&ccedil;lar&#305; Cryptography. - Daralt&#305;lm&#305;&#351;: Artificial intelligence. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography.$0026qf$003dSUBJECT$002509Konu$002509Artificial$002bintelligence.$002509Artificial$002bintelligence.$0026ps$003d300$0026isd$003dtrue? 2024-12-03T06:04:41Z Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2024-12-03T06:04:41Z 2024-12-03T06:04:41Z Yazar&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402041 2024-12-03T06:04:41Z 2024-12-03T06:04:41Z Yazar&#160;Adams, Carlisle. editor.&#160;Camenisch, Jan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-12-03T06:04:41Z 2024-12-03T06:04:41Z Yazar&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>