Search Results for - Narrowed by: Application software. - Computers and civilization. - Data Encryption. - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Application$002bsoftware.$002509Application$002bsoftware.$0026qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-06-27T12:24:16Z Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18687 2024-06-27T12:24:16Z 2024-06-27T12:24:16Z Yazar&#160;Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23504 2024-06-27T12:24:16Z 2024-06-27T12:24:16Z Yazar&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21902 2024-06-27T12:24:16Z 2024-06-27T12:24:16Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>