Search Results for İP. - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d$0025C4$0025B0P.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list
2026-04-10T23:35:36Z
Hardware IP Security and Trust
ent://SD_ILS/0/SD_ILS:614176
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Mishra, Prabhat. editor. Bhunia, Swarup. editor. Tehranipoor, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332461.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188832
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Akar, Nail. editor. Pioro, Michal. editor. Skianis, Charalabos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189188
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Schulzrinne, Henning. editor. State, Radu. editor. Niccolini, Saverio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Secure Networks, Blockchains and Smart Contract Technologies
ent://SD_ILS/0/SD_ILS:605174
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Chung, Jong-Moon. author. (orcid)0000-0002-1652-6635 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-65866-2">https://doi.org/10.1007/978-3-031-65866-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware Protection through Obfuscation
ent://SD_ILS/0/SD_ILS:613957
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Forte, Domenic. editor. Bhunia, Swarup. editor. Tehranipoor, Mark M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:613859
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Hirt, Martin. editor. Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:615946
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Hirt, Martin. editor. Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ten Laws for Security
ent://SD_ILS/0/SD_ILS:617805
2026-04-10T23:35:36Z
2026-04-10T23:35:36Z
Author Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>