Arama Sonuçlarını Sınırlandır
Material Type
Language
Shelf Location
Library
14 sonuç bulundu Arama sonuçlarına abone ol
000000000000DEFAULT_TR
Yazdır
by 
Aslanoğlu, Rabia.
Format: 
Alıntı: 
Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme/
by 
Kul, Aslı, author.
Format: 
Alıntı: 
Blockchain technology. It is due to the use of distributed and cryptography methods that are widely used
by 
Özdemir, Oğulcan, author.
Format: 
Alıntı: 
computer science. Research on the use and measurement of "time-locked cryptography" in computer science is
by 
Karaçay, Mustafa, author.
Format: 
Alıntı: 
, designed, and implemented with a Homomorphic Cryptography Scheme or HTTPS. However, there is a new popular
by 
Mutlu, Görkem, author.
Format: 
Alıntı: 
Cryptography
by 
Hışıl, Hüseyin.
Format: 
Alıntı: 
Cryptography.
by 
Kayayurt, Barış.
Format: 
Alıntı: 
, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes