Search Results for Data structures (Computer science). - Narrowed by: Systems engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Systems$002bengineering.$002509Systems$002bengineering.$0026te$003dILS$0026ps$003d300?dt=list 2024-12-22T22:34:16Z Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331657.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Digital Video Techniques for DRM and Content Protection ent://SD_ILS/0/SD_ILS:193574 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17345-5">http://dx.doi.org/10.1007/978-3-642-17345-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:190836 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Engineering ent://SD_ILS/0/SD_ILS:166887 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71817-0">http://dx.doi.org/10.1007/978-0-387-71817-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Algorithms on Reconfigurable Hardware ent://SD_ILS/0/SD_ILS:166167 2024-12-22T22:34:16Z 2024-12-22T22:34:16Z Author&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. author.&#160;P&eacute;rez, Arturo D&iacute;az. author.&#160;Saqib, Nazar Abbas. author.&#160;Ko&ccedil;, &Ccedil;etin Kaya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36682-1">http://dx.doi.org/10.1007/978-0-387-36682-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>