Arama Sonuçları Security systems. - Daraltılmış: Computational complexity.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026ps$003d300?dt=list2025-04-09T23:47:06ZAdvances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3345872025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Johansson, Thomas. editor. Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334587.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part Ient://SD_ILS/0/SD_ILS:3348812025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334881.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part IIent://SD_ILS/0/SD_ILS:3348882025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334888.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351972025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Stam, Martijn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335197.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602025-04-09T23:47:06Z2025-04-09T23:47:06ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>