Arama Sonuçları Koltuksuz, AhmetSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dKoltuksuz$00252C$002bAhmet$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300?dt=list2025-07-04T13:29:49ZAn approch to the security problems inthe TCP ip protocol suite for a network security monitor designent://SD_ILS/0/SD_ILS:78612025-07-04T13:29:49Z2025-07-04T13:29:49Zby Mutaf, Pars.<br/><a href="http://hdl.handle.net/11147/3871">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Libraryent://SD_ILS/0/SD_ILS:634182025-07-04T13:29:49Z2025-07-04T13:29:49Zby Uslu, Sevgi.<br/><a href="http://hdl.handle.net/11147/3836">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A firewall design for academic environmentsent://SD_ILS/0/SD_ILS:878402025-07-04T13:29:49Z2025-07-04T13:29:49Zby Tok, Metin.<br/><a href="http://hdl.handle.net/11147/3974">Access to Electronic Version.</a><br/>Format: El Yazması<br/>On primality testingent://SD_ILS/0/SD_ILS:441682025-07-04T13:29:49Z2025-07-04T13:29:49Zby Tepeli, Murat.<br/><a href="http://hdl.handle.net/11147/3686">Access to Electronic Version.</a><br/>Format: El Yazması<br/>The web-based application of key exchange protocols for digital and mobile signatures.ent://SD_ILS/0/SD_ILS:881852025-07-04T13:29:49Z2025-07-04T13:29:49Zby Akalp, Evren.<br/><a href="http://hdl.handle.net/11147/3986">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A distributed multiprecision cryptographic library designent://SD_ILS/0/SD_ILS:165652025-07-04T13:29:49Z2025-07-04T13:29:49Zby Hışıl, Hüseyin.<br/><a href="http://hdl.handle.net/11147/3226">Access to Electronic Version.</a><br/>Format: El Yazması<br/>The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystemsent://SD_ILS/0/SD_ILS:633602025-07-04T13:29:49Z2025-07-04T13:29:49Zby Mersin, Ali.<br/><a href="http://hdl.handle.net/11147/3830">Access to Electronic Version.</a><br/>Format: El Yazması<br/>An Implementation Model For Open Sources Evaluationent://SD_ILS/0/SD_ILS:169052025-07-04T13:29:49Z2025-07-04T13:29:49Zby Tekir, Selma.<br/><a href="http://hdl.handle.net/11147/3329">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A genetic algorithmic approach to the differential and linear cryptanalysisent://SD_ILS/0/SD_ILS:875682025-07-04T13:29:49Z2025-07-04T13:29:49Zby Eminağaoğlu, Mete.<br/><a href="http://hdl.handle.net/11147/3968">Access to Electronic Version.</a><br/>Format: El Yazması<br/>The development of a social network analysis software toolent://SD_ILS/0/SD_ILS:484932025-07-04T13:29:49Z2025-07-04T13:29:49Zby Soydan, Cansoy.<br/><a href="http://hdl.handle.net/11147/3718">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystemsent://SD_ILS/0/SD_ILS:578512025-07-04T13:29:49Z2025-07-04T13:29:49Zby Beyazıt, Mutlu.<br/><a href="http://hdl.handle.net/11147/3802">Access to Electronic Version.</a><br/>Format: El Yazması<br/>An analysis of key generation efficiency of rsa cryptos ystem in distributed environmentsent://SD_ILS/0/SD_ILS:169342025-07-04T13:29:49Z2025-07-04T13:29:49Zby Çağrıcı, Gökhan.<br/><a href="http://hdl.handle.net/11147/3339">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Modelling of Turkey Turkish words by Discretemarkov processesent://SD_ILS/0/SD_ILS:78622025-07-04T13:29:49Z2025-07-04T13:29:49Zby Güventürk, Jale.<br/><a href="http://hdl.handle.net/11147/3872">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Quality life cycle of object oriented software development in extreme programmingent://SD_ILS/0/SD_ILS:857952025-07-04T13:29:49Z2025-07-04T13:29:49Zby Mutlu, Gökçe.<br/><a href="http://hdl.handle.net/11147/3959">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A Turkish password cracker for unix based operating systemsent://SD_ILS/0/SD_ILS:78142025-07-04T13:29:49Z2025-07-04T13:29:49Zby Tahaoğlu, Osman Okyar.<br/><a href="http://hdl.handle.net/11147/3870">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Defining a sample template for governmental procurements of cryptographic productsent://SD_ILS/0/SD_ILS:169352025-07-04T13:29:49Z2025-07-04T13:29:49Zby Taş, Levent.<br/><a href="http://hdl.handle.net/11147/3340">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A mathematical modelling for manpower planningent://SD_ILS/0/SD_ILS:816532025-07-04T13:29:49Z2025-07-04T13:29:49Zby Uludağ ,Mehmet.<br/><a href="http://hdl.handle.net/11147/3882">Access to Electronic Version.</a><br/>Format: El Yazması<br/>