Search Results for - Narrowed by: Computer science -- Mathematics. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bscience$002b--$002bMathematics.$002509Computer$002bscience$002b--$002bMathematics.$0026qf$003dSUBJECT$002509Konu$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-05-17T09:31:16Z Cryptography Made Simple ent://SD_ILS/0/SD_ILS:16741 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Smart, Nigel P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21936-3">http://dx.doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:18611 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Compression-Based Methods of Statistical Analysis and Prediction of Time Series ent://SD_ILS/0/SD_ILS:17725 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Ryabko, Boris. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32253-7">http://dx.doi.org/10.1007/978-3-319-32253-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:24846 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/> Theory and Applications of Models of Computation 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22643 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Jain, Rahul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17142-5">http://dx.doi.org/10.1007/978-3-319-17142-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:23638 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Applebaum, Benny. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-17367-7">http://dx.doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:20563 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;J&uuml;rjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format:&#160;Electronic Resources<br/> Theory and Applications of Models of Computation 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20771 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Gopal, T. V. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06089-7">http://dx.doi.org/10.1007/978-3-319-06089-7</a><br/>Format:&#160;Electronic Resources<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:21152 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Mathematics and Computational Science ent://SD_ILS/0/SD_ILS:21565 2024-05-17T09:31:16Z 2024-05-17T09:31:16Z Yazar&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10683-0">http://dx.doi.org/10.1007/978-3-319-10683-0</a><br/>Format:&#160;Electronic Resources<br/>