Search Results for Computational intelligence. - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputational$002bintelligence.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-08-09T11:00:29Z Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2024-08-09T11:00:29Z 2024-08-09T11:00:29Z Author&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Techniques and Applications ent://SD_ILS/0/SD_ILS:185738 2024-08-09T11:00:29Z 2024-08-09T11:00:29Z Author&#160;Chen, Hsinchun. editor.&#160;Yang, Christopher C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Steganography Techniques for Digital Images ent://SD_ILS/0/SD_ILS:487340 2024-08-09T11:00:29Z 2024-08-09T11:00:29Z Author&#160;Yahya, Abid. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>