Arama Sonuçları Gennaro, Rosario.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dGennaro$00252C$002bRosario.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-30T22:03:52ZAdvances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5193142026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Gennaro, Rosario. editor. Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-48000-7">https://doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5189932026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Gennaro, Rosario. editor. Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-47989-6">https://doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890662026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Garay, Juan A. editor. Gennaro, Rosario. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4895752026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Garay, Juan A. editor. Gennaro, Rosario. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Cryptography – PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1940242026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Catalano, Dario. editor. Fazio, Nelly. editor. Gennaro, Rosario. editor. Nicolosi, Antonio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1856472026-03-30T22:03:52Z2026-03-30T22:03:52ZYazar Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>