Search Results for Data encryption (Computer science) - Narrowed by: Computational intelligence.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Computational$002bintelligence.$002509Computational$002bintelligence.$0026ps$003d300$0026isd$003dtrue?
2025-12-11T00:02:05Z
A Nature-Inspired Approach to Cryptology
ent://SD_ILS/0/SD_ILS:528952
2025-12-11T00:02:05Z
2025-12-11T00:02:05Z
Author Shandilya, Shishir Kumar. author. Datta, Agni. author. Nagar, Atulya K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Crypto and AI From Coevolution to Quantum Revolution
ent://SD_ILS/0/SD_ILS:528761
2025-12-11T00:02:05Z
2025-12-11T00:02:05Z
Author Zolfaghari, Behrouz. author. Nemati, Hamid. author. Yanai, Naoto. author. Bibak, Khodakhast. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Steganography Techniques for Digital Images
ent://SD_ILS/0/SD_ILS:487340
2025-12-11T00:02:05Z
2025-12-11T00:02:05Z
Author Yahya, Abid. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>