Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Cryptology. - Souidi, El Mamoun. editor.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dAUTHOR$002509Yazar$002509Souidi$00252C$002bEl$002bMamoun.$002beditor.$002509Souidi$00252C$002bEl$002bMamoun.$002beditor.$0026ps$003d300?2024-05-30T19:16:43ZCodes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-05-30T19:16:43Z2024-05-30T19:16:43ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carletent://SD_ILS/0/SD_ILS:2222012024-05-30T19:16:43Z2024-05-30T19:16:43ZYazar El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format: Electronic Resources<br/>