Search Results for Data Encryption. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list
2025-12-08T17:28:09Z
Crypto and AI From Coevolution to Quantum Revolution
ent://SD_ILS/0/SD_ILS:528761
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Zolfaghari, Behrouz. author. Nemati, Hamid. author. Yanai, Naoto. author. Bibak, Khodakhast. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Nature-Inspired Approach to Cryptology
ent://SD_ILS/0/SD_ILS:528952
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Shandilya, Shishir Kumar. author. Datta, Agni. author. Nagar, Atulya K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
ent://SD_ILS/0/SD_ILS:458788
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Shavers, Brett, author. Bair, John, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Audio Watermarking Based on Singular Value Decomposition
ent://SD_ILS/0/SD_ILS:530260
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Dhar, Pranab Kumar. author. Shimamura, Tetsuya. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soliton Coding for Secured Optical Communication Link
ent://SD_ILS/0/SD_ILS:530297
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Sadegh Amiri, Iraj. author. Alavi, Sayed Ehsan. author. Mahdaliza Idrus, Sevia. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Cryptography and Secret-Key Distillation
ent://SD_ILS/0/SD_ILS:235140
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Assche, Gilles van .<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Everyday Cryptography Fundamental Principles and Applications
ent://SD_ILS/0/SD_ILS:279211
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Martin, Keith M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Boolean functions and applications
ent://SD_ILS/0/SD_ILS:147530
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless security and cryptography : specifications and implementations
ent://SD_ILS/0/SD_ILS:543513
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number TK5103.2 .W57415 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Authentication codes and combinatorial designs
ent://SD_ILS/0/SD_ILS:547049
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Pei, Dingyi., author.<br/>Preferred Shelf Number QA76.9 .A25 P42 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Quantum communications and cryptography
ent://SD_ILS/0/SD_ILS:543504
2025-12-08T17:28:09Z
2025-12-08T17:28:09Z
Author Sergienko, Alexander V.<br/>Preferred Shelf Number TK5102.94 .Q36 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>