Search Results for -- ANS&#304;KLOPED&#304;LER. - Narrowed by: E-Book - Online Library - Data encryption (Computer science). - Systems engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bANS$0025C4$0025B0KLOPED$0025C4$0025B0LER.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Systems$002bengineering.$002509Systems$002bengineering.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-08-15T01:54:13Z The Hardware Trojan War Attacks, Myths, and Defenses ent://SD_ILS/0/SD_ILS:400849 2024-08-15T01:54:13Z 2024-08-15T01:54:13Z Author&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:400923 2024-08-15T01:54:13Z 2024-08-15T01:54:13Z Author&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-08-15T01:54:13Z 2024-08-15T01:54:13Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Engineering ent://SD_ILS/0/SD_ILS:166887 2024-08-15T01:54:13Z 2024-08-15T01:54:13Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71817-0">http://dx.doi.org/10.1007/978-0-387-71817-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID Security Techniques, Protocols and System-on-Chip Design ent://SD_ILS/0/SD_ILS:167344 2024-08-15T01:54:13Z 2024-08-15T01:54:13Z Author&#160;Kitsos, Paris. editor.&#160;Zhang, Yan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>