Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Konu: Cryptography.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(3)
Rayns, Chris.
(2)
Blake, Barry J.
(1)
Canteaut, Anne.
(1)
Cao, Zhenfu.
(1)
Churchhouse, R. F.
(1)
Dam, Kenneth W.
(1)
Fionov, Andrey.
(1)
Gazeau, Jean-Pierre.
(1)
Gorman, G. E.
(1)
Horodecki, Ryszard.
(1)
Huang, Hsiang-Cheh.
(1)
Hänninen, Pekka.
(1)
Jain, L. C.
(1)
Johnson, Simon.
(1)
Junod, Pascal.
(1)
Kappeler, Patrick.
(1)
Kilin, Sergei Ya.
(1)
Konheim, Alan G., 1934-
(1)
Kowalik, Janusz.
(1)
Lek, Kamol.
(1)
Lin, Herbert.
(1)
Martinez-Moro, Edgar.
(1)
Nešetřil, Jaroslav.
(1)
Oppliger, Rolf.
(1)
Pan, Jeng-Shyang.
(1)
Prabhakaran, Manoj M.
(1)
Rajapakse, Naruemol.
(1)
Rovan, B. (Branislav)
(1)
Ryabko, Boris.
(1)
Sahai, Amit.
(1)
St. Denis, Tom.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(21)
Yayın Yılı
Dahil
Hariç
-
2003
(3)
2004
(3)
2007
(3)
2010
(3)
2005
(2)
2012
(2)
2013
(2)
1996
(1)
2002
(1)
2011
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(21)
Computer security.
(8)
Data encryption (Computer science)
(6)
Ciphers.
(3)
Coding theory.
(2)
Internet -- Security measures.
(2)
Computer networks -- Security measures.
(1)
Computer science -- Mathematics.
(1)
Computer security -- Management.
(1)
Computer software -- Development.
(1)
Data protection.
(1)
Digital watermarking.
(1)
Embedded computer systems.
(1)
Geometry, Algebraic.
(1)
Hashing (Computer science)
(1)
Historical linguistics.
(1)
IBM computers.
(1)
Physics.
(1)
Quantum communication.
(1)
Quantum computers.
(1)
Quantum theory.
(1)
Technology -- Research -- United States.
(1)
Telecommunication -- Security measures.
(1)
Telecommunication systems -- Security measures -- Government policy -- United States.
(1)
Watermarks -- Data processing.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
21 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Secure multi-party computation
1.
Secure multi-party computation
by
Prabhakaran, Manoj M.
Click to View
Format:
Algebraic geometry modeling in information theory
2.
Algebraic geometry modeling in information theory
by
Martinez-Moro, Edgar.
Click to View
Format:
Cryptography protocols, design and applications
3.
Cryptography protocols, design and applications
by
Lek, Kamol.
Click to View
Format:
New directions of modern cryptography
4.
New directions of modern cryptography
by
Cao, Zhenfu.
Click to View
Format:
Advanced linear cryptanalysis of block and stream ciphers
5.
Advanced linear cryptanalysis of block and stream ciphers
by
Junod, Pascal.
Click to View
Format:
Quantum cryptography and computing theory and implementation
6.
Quantum cryptography and computing theory and implementation
by
Horodecki, Ryszard.
Click to View
Format:
Secret language
7.
Secret language
by
Blake, Barry J.
Click to View
Format:
Hashing in computer science fifty years of slicing and dicing
8.
Hashing in computer science fifty years of slicing and dicing
by
Konheim, Alan G., 1934-
Click to View
Format:
Cryptography for developers
9.
Cryptography for developers
by
St. Denis, Tom.
Click to View
Format:
Online information review. Volume 31, Number 5, Issues in online security
10.
Online information review. Volume 31, Number 5, Issues in online security
by
Gorman, G. E.
Click to View
Format:
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security
11.
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security
by
Gazeau, Jean-Pierre.
Click to View
Format:
Contemporary cryptography
12.
Contemporary cryptography
by
Oppliger, Rolf.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action