Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Computation by Abstract Devices. - Nielsen, Jesper Buus. editor. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computation$002bby$002bAbstract$002bDevices.$002509Computation$002bby$002bAbstract$002bDevices.$0026qf$003dAUTHOR$002509Yazar$002509Nielsen$00252C$002bJesper$002bBuus.$002beditor.$002509Nielsen$00252C$002bJesper$002bBuus.$002beditor.$0026ps$003d300? 2024-05-23T21:51:26Z Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24743 2024-05-23T21:51:26Z 2024-05-23T21:51:26Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24744 2024-05-23T21:51:26Z 2024-05-23T21:51:26Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/>