Search Results for Data Encryption. - Narrowed by: Data transmission systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Data$002btransmission$002bsystems.$002509Data$002btransmission$002bsystems.$0026ic$003dtrue$0026ps$003d300? 2025-12-15T07:13:25Z Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400161 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Shacham, Hovav. editor.&#160;Boldyreva, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Noiseless steganography : the key to covert communications ent://SD_ILS/0/SD_ILS:546597 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Desoky, Abdelrahman., author.<br/>Preferred Shelf Number&#160;QA268 .D47 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439846223">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Forensic Computing ent://SD_ILS/0/SD_ILS:175532 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Sammes, Tony. author.&#160;Jenkinson, Brian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-732-9">http://dx.doi.org/10.1007/978-1-84628-732-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:165226 2025-12-15T07:13:25Z 2025-12-15T07:13:25Z Author&#160;Furht, Borko. author.&#160;Muharemagic, Edin. author.&#160;Socek, Daniel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>