Search Results for Data encryption (Computer science). - Narrowed by: Electrical engineering.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Electrical$002bengineering.$002509Electrical$002bengineering.$0026ps$003d300?
2024-12-14T08:51:40Z
Multi-photon Quantum Secure Communication
ent://SD_ILS/0/SD_ILS:486171
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Verma, Pramode K. author. El Rifai, Mayssaa. author. Chan, Kam Wai Clifford. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8618-2">https://doi.org/10.1007/978-981-10-8618-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Science and Cybersecurity
ent://SD_ILS/0/SD_ILS:484756
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Pino, Robinson E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Querying over Encrypted Data in Smart Grids
ent://SD_ILS/0/SD_ILS:487757
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Wen, Mi. author. Lu, Rongxing. author. Liang, Xiaohui. author. Lei, Jingsheng. author. Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in Cloud Systems
ent://SD_ILS/0/SD_ILS:487946
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Secrets in Communication Security
ent://SD_ILS/0/SD_ILS:488222
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Xiao, Sheng. author. Gong, Weibo. author. Towsley, Don. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Platforms TPM2.0 in Context
ent://SD_ILS/0/SD_ILS:488634
2024-12-14T08:51:40Z
2024-12-14T08:51:40Z
Author Proudler, Graeme. author. Chen, Liqun. author. Dalton, Chris. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>