Search Results for Computer security. - Narrowed by: Engineering mathematics.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Engineering$002bmathematics.$002509Engineering$002bmathematics.$0026ps$003d300?2024-09-28T09:38:11ZA Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modelingent://SD_ILS/0/SD_ILS:249652024-09-28T09:38:11Z2024-09-28T09:38:11ZYazar Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:2247302024-09-28T09:38:11Z2024-09-28T09:38:11ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vorticesent://SD_ILS/0/SD_ILS:174512024-09-28T09:38:11Z2024-09-28T09:38:11ZYazar Izmailov, Igor. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30125-9">http://dx.doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Electronic Resources<br/>Mapping Biological Systems to Network Systemsent://SD_ILS/0/SD_ILS:174102024-09-28T09:38:11Z2024-09-28T09:38:11ZYazar Rathore, Heena. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29782-8">http://dx.doi.org/10.1007/978-3-319-29782-8</a><br/>Format: Electronic Resources<br/>Proceedings of the Third International Conference on Soft Computing for Problem Solving SocProS 2013, Volume 1ent://SD_ILS/0/SD_ILS:250382024-09-28T09:38:11Z2024-09-28T09:38:11ZYazar Pant, Millie. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1771-8">http://dx.doi.org/10.1007/978-81-322-1771-8</a><br/>Format: Electronic Resources<br/>