Search Results for Computer mathematics. - Narrowed by: Electronic Resources - Information Systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bmathematics.$0026qf$003dFORMAT$002509Format$002509ER$002509Electronic$002bResources$0026qf$003dSUBJECT$002509Konu$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300$0026isd$003dtrue? 2024-07-01T00:15:59Z Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224259 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:224897 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:223803 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222093 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222109 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Algebra in Scientific Computing 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222243 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Gerdt, Vladimir P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66320-3">https://doi.org/10.1007/978-3-319-66320-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:221396 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225700 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Rass, Stefan. editor. (orcid)0000-0003-2821-2489<br/><a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format:&#160;Electronic Resources<br/> Semantic Applications Methodology, Technology, Corporate Use ent://SD_ILS/0/SD_ILS:222911 2024-07-01T00:15:59Z 2024-07-01T00:15:59Z Yazar&#160;Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format:&#160;Electronic Resources<br/>