Search Results for - Narrowed by: Computer science -- Mathematics. - Data Structures, Cryptology and Information Theory.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bscience$002b--$002bMathematics.$002509Computer$002bscience$002b--$002bMathematics.$0026qf$003dSUBJECT$002509Konu$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300?2024-05-17T09:31:16ZCryptography Made Simpleent://SD_ILS/0/SD_ILS:167412024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Smart, Nigel P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21936-3">http://dx.doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:186112024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Compression-Based Methods of Statistical Analysis and Prediction of Time Seriesent://SD_ILS/0/SD_ILS:177252024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Ryabko, Boris. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32253-7">http://dx.doi.org/10.1007/978-3-319-32253-7</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:248462024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format: Electronic Resources<br/>Theory and Applications of Models of Computation 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:226432024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Jain, Rahul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17142-5">http://dx.doi.org/10.1007/978-3-319-17142-5</a><br/>Format: Electronic Resources<br/>Cryptography in Constant Parallel Timeent://SD_ILS/0/SD_ILS:236382024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Applebaum, Benny. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-17367-7">http://dx.doi.org/10.1007/978-3-642-17367-7</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:205632024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Theory and Applications of Models of Computation 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:207712024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Gopal, T. V. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06089-7">http://dx.doi.org/10.1007/978-3-319-06089-7</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Open Problems in Mathematics and Computational Scienceent://SD_ILS/0/SD_ILS:215652024-05-17T09:31:16Z2024-05-17T09:31:16ZYazar Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10683-0">http://dx.doi.org/10.1007/978-3-319-10683-0</a><br/>Format: Electronic Resources<br/>