Search Results for Cryptography. - Narrowed by: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list 2026-03-22T22:23:10Z Cryptography Made Simple ent://SD_ILS/0/SD_ILS:617695 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SCION: A Secure Internet Architecture ent://SD_ILS/0/SD_ILS:613238 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Perrig, Adrian. author.&#160;Szalachowski, Pawel. author.&#160;Reischuk, Raphael M. author.&#160;Chuat, Laurent. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:617190 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Reardon, Joel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy Second International Conference, AIS&amp;P 2024, Guangzhou, China, December 6-7, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606953 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Zhang, Fangguo. editor. (orcid)0000-0002-0486-6413&#160;Lin, Weiwei. editor. (orcid)0000-0001-6876-1795&#160;Yan, Hongyang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1148-5">https://doi.org/10.1007/978-981-96-1148-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602517 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9788-6">https://doi.org/10.1007/978-981-99-9788-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Resilience: Navigating Disruption and Safeguarding Data Privacy ent://SD_ILS/0/SD_ILS:603395 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Shandilya, Shishir Kumar. author. (orcid)0000-0002-3308-4445&#160;Datta, Agni. author.&#160;Kartik, Yash. author.&#160;Nagar, Atulya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53290-0">https://doi.org/10.1007/978-3-031-53290-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602516 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9785-5">https://doi.org/10.1007/978-981-99-9785-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:611692 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Mostafa Fouad, Mohamed. editor.&#160;Manaf, Azizah Abdul. editor.&#160;Zamani, Mazdak. editor.&#160;Ahmad, Rabiah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:616283 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:616141 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Bas, Patrick. author.&#160;Furon, Teddy. author.&#160;Cayre, Fran&ccedil;ois. author.&#160;Do&euml;rr, Gwena&euml;l. author.&#160;Mathon, Benjamin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices ent://SD_ILS/0/SD_ILS:616596 2026-03-22T22:23:10Z 2026-03-22T22:23:10Z Author&#160;Izmailov, Igor. author.&#160;Poizner, Boris. author.&#160;Romanov, Ilia. author.&#160;Smolskiy, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>