Search Results for Cryptography. - Narrowed by: Electronics. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Electronics.$002509Electronics.$0026ps$003d300?dt=list 2026-03-22T13:56:18Z Secure Data Deletion ent://SD_ILS/0/SD_ILS:617190 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Reardon, Joel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware Security A Look into the Future ent://SD_ILS/0/SD_ILS:603894 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Tehranipoor, Mark. author.&#160;Zamiri Azar, Kimia. author.&#160;Asadizanjani, Navid. author. (orcid)0000-0003-3347-5072&#160;Rahman, Fahim. author.&#160;Mardani Kamali, Hadi. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58687-3">https://doi.org/10.1007/978-3-031-58687-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolving networking technologies : developments and future directions ent://SD_ILS/0/SD_ILS:598339 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Gupta, Shaurya, editor.<br/>Preferred Shelf Number&#160;TK5105.5 .E96 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:614176 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Mishra, Prabhat. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:613957 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Forte, Domenic. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Hardware IP Protection ent://SD_ILS/0/SD_ILS:614566 2026-03-22T13:56:18Z 2026-03-22T13:56:18Z Author&#160;Bossuet, Lilian. editor.&#160;Torres, Lionel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50380-6">https://doi.org/10.1007/978-3-319-50380-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>