Search Results for Data Encryption. - Narrowed by: Theory of Computation. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Konu$002509Theory$002bof$002bComputation.$002509Theory$002bof$002bComputation.$0026ps$003d300$0026isd$003dtrue? 2024-07-10T12:05:33Z Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21027 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:23488 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:20559 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:21446 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226655 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24886 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24887 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24653 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:24654 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-07-10T12:05:33Z 2024-07-10T12:05:33Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/>