Search Results for - Narrowed by: Springer E-Book Collection - Coding and Information Theory. - Algorithms.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Konu$002509Algorithms.$002509Algorithms.$0026ps$003d300$0026isd$003dtrue?2024-05-31T02:44:54ZAn Introduction to Kolmogorov Complexity and Its Applicationsent://SD_ILS/0/SD_ILS:4278512024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Li, Ming. author.<br/><a href="https://doi.org/10.1007/978-3-030-11298-1">https://doi.org/10.1007/978-3-030-11298-1</a><br/>Format: Electronic Resources<br/>Algebraic Informatics 8th International Conference, CAI 2019, Niš, Serbia, June 30–July 4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289322024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Ćirić, Miroslav. editor. (orcid)0000-0001-8625-4682<br/><a href="https://doi.org/10.1007/978-3-030-21363-3">https://doi.org/10.1007/978-3-030-21363-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Economics of Grids, Clouds, Systems, and Services 12th International Conference, GECON 2015, Cluj-Napoca, Romania, September 15-17, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:182342024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Altmann, Jörn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43177-2">http://dx.doi.org/10.1007/978-3-319-43177-2</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225302024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235762024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:228452024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225922024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:218842024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220052024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:243902024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240222024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:218462024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:240022024-05-31T02:44:54Z2024-05-31T02:44:54ZYazar Bacon, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54429-3">http://dx.doi.org/10.1007/978-3-642-54429-3</a><br/>Format: Electronic Resources<br/>