Search Results for - Narrowed by: Springer E-Book Collection - Takagi, Tsuyoshi. editor.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dAUTHOR$002509Yazar$002509Takagi$00252C$002bTsuyoshi.$002beditor.$002509Takagi$00252C$002bTsuyoshi.$002beditor.$0026ps$003d300?2024-05-03T20:55:52ZFrontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212822024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:2247302024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265872024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173532024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Applications + Practical Conceptualization + Mathematics = fruitful Innovation Proceedings of the Forum of Mathematics for Industry 2014ent://SD_ILS/0/SD_ILS:187172024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Anderssen, Robert S. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55342-7">http://dx.doi.org/10.1007/978-4-431-55342-7</a><br/>Format: Electronic Resources<br/>The Impact of Applications on Mathematics Proceedings of the Forum of Mathematics for Industry 2013ent://SD_ILS/0/SD_ILS:249552024-05-03T20:55:52Z2024-05-03T20:55:52ZYazar Wakayama, Masato. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-54907-9">http://dx.doi.org/10.1007/978-4-431-54907-9</a><br/>Format: Electronic Resources<br/>