Arama Sonuçları Security. - Daraltılmış: Computational complexity.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity.$0026qf$003dSUBJECT$002509Konu$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026ps$003d300?2025-12-20T01:39:12ZEncyclopedia of Cryptography, Security and Privacyent://SD_ILS/0/SD_ILS:4870702025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthdayent://SD_ILS/0/SD_ILS:1964282025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Naccache, David. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973842025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1976032025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1971532025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Kim, Howon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1947382025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1955782025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959662025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1950472025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Parampalli, Udaya. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936562025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transactions on Computational Science XI Special Issue on Security in Computing, Part IIent://SD_ILS/0/SD_ILS:1936812025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Gavrilova, Marina L. editor. Tan, C. J. Kenneth. editor. Moreno, Edward David. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17697-5">http://dx.doi.org/10.1007/978-3-642-17697-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1924202025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1925442025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1926492025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Abe, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909502025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1910122025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1897872025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914942025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1914912025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892342025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1876812025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877202025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1837122025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Won, Dong Ho. editor. Kim, Seungjoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1851802025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852142025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Roy, Bimal. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4017972025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Kaczorowski, Jerzy. editor. Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 Pomykała, Jacek. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The LLL Algorithm Survey and Applicationsent://SD_ILS/0/SD_ILS:1902782025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Safety Dynamics Evaluating Risk in Complex Industrial Systemsent://SD_ILS/0/SD_ILS:4844262025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Guarnieri, Franck. editor. Garbolino, Emmanuel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96259-7">https://doi.org/10.1007/978-3-319-96259-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysisent://SD_ILS/0/SD_ILS:3989952025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Nakahara Jr., Jorge. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001582025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Iliopoulos, Costas. editor. Leong, Hon Wai. editor. Sung, Wing-Kin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mathematical Software – ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001602025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Davenport, James H. editor. (orcid)0000-0002-3982-7545 Kauers, Manuel. editor. Labahn, George. editor. Urban, Josef. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Combinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4007032025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627 Ryan, Joe. editor. (orcid)0000-0002-7781-0306 Smyth, William F. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part Ient://SD_ILS/0/SD_ILS:3348812025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334881.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part IIent://SD_ILS/0/SD_ILS:3348882025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334888.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3345872025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Johansson, Thomas. editor. Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334587.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351972025-12-20T01:39:12Z2025-12-20T01:39:12ZYazar Stam, Martijn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335197.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>