Search Results for - Narrowed by: Algorithms. - Cryptology. - Data encryption (Computer science).
SirsiDynix Enterprise
https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Algorithms.$002509Algorithms.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2024-09-24T09:46:45Z
Deep Reinforcement Learning Frontiers of Artificial Intelligence
ent://SD_ILS/0/SD_ILS:429100
2024-09-24T09:46:45Z
2024-09-24T09:46:45Z
Yazar Sewak, Mohit. author.<br/><a href="https://doi.org/10.1007/978-981-13-8285-7">https://doi.org/10.1007/978-981-13-8285-7</a><br/>Format: Electronic Resources<br/>
Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:225176
2024-09-24T09:46:45Z
2024-09-24T09:46:45Z
Yazar Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Electronic Resources<br/>
Random Numbers and Computers
ent://SD_ILS/0/SD_ILS:222849
2024-09-24T09:46:45Z
2024-09-24T09:46:45Z
Yazar Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format: Electronic Resources<br/>