Arama Sonuçlarını Sınırlandır
by
Aslanoğlu, Rabia.
Format:
Alıntı:
Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme/
by
Kul, Aslı, author.
Format:
Alıntı:
Blockchain technology. It is due to the use of distributed and cryptography methods that are widely used
by
Özdemir, Oğulcan, author.
Format:
Alıntı:
computer science. Research on the use and measurement of "time-locked cryptography" in computer science is
by
Karaçay, Mustafa, author.
Format:
Alıntı:
, designed, and implemented with a Homomorphic Cryptography Scheme or HTTPS. However, there is a new popular
by
Mutlu, Görkem, author.
Format:
Alıntı:
Cryptography
by
Beyazıt, Mutlu.
Format:
Alıntı:
Cryptography.
by
Mersin, Ali.
Format:
Alıntı:
Cryptography.
by
Uslu, Sevgi.
Format:
Alıntı:
Cryptography.
by
Taş, Levent.
Format:
Alıntı:
Cryptography -- Standards
by
Hışıl, Hüseyin.
Format:
Alıntı:
Cryptography.
by
Çağrıcı, Gökhan.
Format:
Alıntı:
Public key cryptography
by
Kayayurt, Barış.
Format:
Alıntı:
, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes
Eylem Seç