Search Results for Cryptography - Narrowed by: Communications Engineering, Networks. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Communications$002bEngineering$00252C$002bNetworks.$002509Communications$002bEngineering$00252C$002bNetworks.$0026ps$003d300? 2025-12-10T21:55:18Z Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems and Sustainability Proceedings of ICT4SD 2023, Volume 1 ent://SD_ILS/0/SD_ILS:528717 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Tuba, Milan. editor.&#160;Akashe, Shyam. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5652-4">https://doi.org/10.1007/978-981-99-5652-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT Based Control Networks and Intelligent Systems Proceedings of 3rd ICICNIS 2022 ent://SD_ILS/0/SD_ILS:528979 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Joby, P. P. editor.&#160;Balas, Valentina E. editor.&#160;Palanisamy, Ram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-5845-8">https://doi.org/10.1007/978-981-19-5845-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Third International Conference on Information Management and Machine Intelligence ICIMMI 2021 ent://SD_ILS/0/SD_ILS:529071 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Goyal, Dinesh. editor.&#160;Kumar, Anil. editor.&#160;Piuri, Vincenzo. editor.&#160;Paprzycki, Marcin. editor. (orcid)0000-0002-8069-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2065-3">https://doi.org/10.1007/978-981-19-2065-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Crypto and AI From Coevolution to Quantum Revolution ent://SD_ILS/0/SD_ILS:528761 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Zolfaghari, Behrouz. author.&#160;Nemati, Hamid. author.&#160;Yanai, Naoto. author.&#160;Bibak, Khodakhast. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Electronics Devices and Communication Systems Select Proceedings of MEDCOM 2021 ent://SD_ILS/0/SD_ILS:527157 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Agrawal, Rajeev. editor.&#160;Kishore Singh, Chandramani. editor.&#160;Goyal, Ayush. editor.&#160;Singh, Dinesh Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-6383-4">https://doi.org/10.1007/978-981-19-6383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing Security Tools of WSN and WBAN Networks Applications ent://SD_ILS/0/SD_ILS:530110 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;A. M. El-Bendary, Mohsen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-4-431-55069-3">https://doi.org/10.1007/978-4-431-55069-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Computation and Security Systems Volume Two ent://SD_ILS/0/SD_ILS:529782 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Chaki, Rituparna. editor.&#160;Saeed, Khalid. editor.&#160;Choudhury, Sankhayan. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1988-0">https://doi.org/10.1007/978-81-322-1988-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soliton Coding for Secured Optical Communication Link ent://SD_ILS/0/SD_ILS:530297 2025-12-10T21:55:18Z 2025-12-10T21:55:18Z Author&#160;Sadegh Amiri, Iraj. author.&#160;Alavi, Sayed Ehsan. author.&#160;Mahdaliza Idrus, Sevia. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>