Arama Sonu&ccedil;ları Koltuksuz, Ahmet SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dKoltuksuz$00252C$002bAhmet$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300?dt=list 2025-07-04T13:29:49Z An approch to the security problems inthe TCP ip protocol suite for a network security monitor design ent://SD_ILS/0/SD_ILS:7861 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Mutaf, Pars.<br/><a href="http://hdl.handle.net/11147/3871">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library ent://SD_ILS/0/SD_ILS:63418 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Uslu, Sevgi.<br/><a href="http://hdl.handle.net/11147/3836">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A firewall design for academic environments ent://SD_ILS/0/SD_ILS:87840 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Tok, Metin.<br/><a href="http://hdl.handle.net/11147/3974">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> On primality testing ent://SD_ILS/0/SD_ILS:44168 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Tepeli, Murat.<br/><a href="http://hdl.handle.net/11147/3686">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> The web-based application of key exchange protocols for digital and mobile signatures. ent://SD_ILS/0/SD_ILS:88185 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Akalp, Evren.<br/><a href="http://hdl.handle.net/11147/3986">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A distributed multiprecision cryptographic library design ent://SD_ILS/0/SD_ILS:16565 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Hışıl, H&uuml;seyin.<br/><a href="http://hdl.handle.net/11147/3226">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystems ent://SD_ILS/0/SD_ILS:63360 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Mersin, Ali.<br/><a href="http://hdl.handle.net/11147/3830">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> An Implementation Model For Open Sources Evaluation ent://SD_ILS/0/SD_ILS:16905 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Tekir, Selma.<br/><a href="http://hdl.handle.net/11147/3329">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A genetic algorithmic approach to the differential and linear cryptanalysis ent://SD_ILS/0/SD_ILS:87568 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Eminağaoğlu, Mete.<br/><a href="http://hdl.handle.net/11147/3968">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> The development of a social network analysis software tool ent://SD_ILS/0/SD_ILS:48493 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Soydan, Cansoy.<br/><a href="http://hdl.handle.net/11147/3718">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystems ent://SD_ILS/0/SD_ILS:57851 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Beyazıt, Mutlu.<br/><a href="http://hdl.handle.net/11147/3802">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> An analysis of key generation efficiency of rsa cryptos ystem in distributed environments ent://SD_ILS/0/SD_ILS:16934 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;&Ccedil;ağrıcı, G&ouml;khan.<br/><a href="http://hdl.handle.net/11147/3339">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Modelling of Turkey Turkish words by Discretemarkov processes ent://SD_ILS/0/SD_ILS:7862 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;G&uuml;vent&uuml;rk, Jale.<br/><a href="http://hdl.handle.net/11147/3872">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Quality life cycle of object oriented software development in extreme programming ent://SD_ILS/0/SD_ILS:85795 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Mutlu, G&ouml;k&ccedil;e.<br/><a href="http://hdl.handle.net/11147/3959">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A Turkish password cracker for unix based operating systems ent://SD_ILS/0/SD_ILS:7814 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Tahaoğlu, Osman Okyar.<br/><a href="http://hdl.handle.net/11147/3870">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Defining a sample template for governmental procurements of cryptographic products ent://SD_ILS/0/SD_ILS:16935 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Taş, Levent.<br/><a href="http://hdl.handle.net/11147/3340">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A mathematical modelling for manpower planning ent://SD_ILS/0/SD_ILS:81653 2025-07-04T13:29:49Z 2025-07-04T13:29:49Z by&#160;Uludağ ,Mehmet.<br/><a href="http://hdl.handle.net/11147/3882">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/>