Search Results for Authentication. - Narrowed by: Data encryption (Computer science) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAuthentication.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300? 2026-02-20T16:45:09Z Authentication codes and combinatorial designs ent://SD_ILS/0/SD_ILS:547049 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Pei, Dingyi., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P42 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Multimedia encryption and authentication techniques and applications ent://SD_ILS/0/SD_ILS:543195 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;QA76.575 .M83185 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013450">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:544162 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Ling, San, 1964, author.&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;QA268 .L545 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:539468 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;TA1637 .V544 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2026-02-20T16:45:09Z 2026-02-20T16:45:09Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M67 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>