Search Results for Data encryption (Computer science). - Narrowed by: Security systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-03-20T14:47:29Z
Artificial Intelligence Security and Privacy Second International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings
ent://SD_ILS/0/SD_ILS:606953
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Zhang, Fangguo. editor. (orcid)0000-0002-0486-6413 Lin, Weiwei. editor. (orcid)0000-0001-6876-1795 Yan, Hongyang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-1148-5">https://doi.org/10.1007/978-981-96-1148-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:602517
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Vaidya, Jaideep. editor. Gabbouj, Moncef. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-9788-6">https://doi.org/10.1007/978-981-99-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:602516
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Vaidya, Jaideep. editor. Gabbouj, Moncef. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-9785-5">https://doi.org/10.1007/978-981-99-9785-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Privacy-Preserving Data Communication in Internet of Things
ent://SD_ILS/0/SD_ILS:616283
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Zhu, Liehuang. author. Zhang, Zijian. author. Xu, Chang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Trustworthy Transportation Cyber-Physical Systems
ent://SD_ILS/0/SD_ILS:612754
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Sun, Yunchuan. editor. Song, Houbing. editor. (orcid)0000-0003-2631-9223 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Watermarking Security
ent://SD_ILS/0/SD_ILS:616141
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Bas, Patrick. author. Furon, Teddy. author. Cayre, François. author. Doërr, Gwenaël. author. Mathon, Benjamin. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ten Laws for Security
ent://SD_ILS/0/SD_ILS:617805
2026-03-20T14:47:29Z
2026-03-20T14:47:29Z
Author Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>