Search Results for Data protection. - Narrowed by: Systems engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Systems$002bengineering.$002509Systems$002bengineering.$0026ps$003d300? 2024-10-31T19:31:51Z Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331657.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Trends for FPGAS From Secured to Secure Reconfigurable Systems ent://SD_ILS/0/SD_ILS:206038 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;Badrignans, Benoit. editor.&#160;Danger, Jean Luc. editor.&#160;Fischer, Viktor. editor.&#160;Gogniat, Guy. editor.&#160;Torres, Lionel. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1338-3">http://dx.doi.org/10.1007/978-94-007-1338-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Integrated Circuits and Systems ent://SD_ILS/0/SD_ILS:166890 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;Verbauwhede, Ingrid M.R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71829-3">http://dx.doi.org/10.1007/978-0-387-71829-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:190836 2024-10-31T19:31:51Z 2024-10-31T19:31:51Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>