Search Results for Data. - Narrowed by: Data encryption (Computer science) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300? 2026-02-21T03:31:00Z Next generation mechanism for data encryption ent://SD_ILS/0/SD_ILS:552326 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Kumar, Keshav (Engineer), editor.&#160;Pandey, Bishwajeet, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003508632">https://www.taylorfrancis.com/books/9781003508632</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure searchable encryption and data management ent://SD_ILS/0/SD_ILS:564284 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Gupta, Brij, 1982- author.&#160;Mamta, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G87 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107316">https://www.taylorfrancis.com/books/9781003107316</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:459083 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Hassan, Nihad Ahmad.&#160;Hijazi, Rami.&#160;Salminen, Helvi.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044490">http://www.sciencedirect.com/science/book/9780128044490</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data hiding fundamentals and applications content security in digital media ent://SD_ILS/0/SD_ILS:254524 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Sencar, Husrev T.&#160;Ramkumar Mahalingam.&#160;Akansu, Ali N., 1958-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Attribute-Based Encryption and Access Control ent://SD_ILS/0/SD_ILS:569930 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Huang, Dijiang.&#160;Dong, Qiuxiang.&#160;Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Cryptography. 3 ent://SD_ILS/0/SD_ILS:599815 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum algorithms and their applications in cryptology : a practical approach ent://SD_ILS/0/SD_ILS:567884 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Singh, Bhupendra, author.&#160;Mylsamy, Mohankumar, author.&#160;Thangarajan, Thamaraimanalan, author.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606338">https://www.taylorfrancis.com/books/9781003606338</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Manuscrypt : designed for mankind - anthropocentric information security ent://SD_ILS/0/SD_ILS:579444 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied satisfiability : cryptography, scheduling and coalitional games ent://SD_ILS/0/SD_ILS:599624 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Liao, Xiaojuan, author.&#160;Koshimura, Miyuki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A3 L53 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography 2 ent://SD_ILS/0/SD_ILS:599724 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography for Payment Professionals ent://SD_ILS/0/SD_ILS:561838 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Dubinsky, Ilya, author.<br/>Preferred Shelf Number&#160;HG1710<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003371366">https://www.taylorfrancis.com/books/9781003371366</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Holistic approach to quantum cryptography in cyber security ent://SD_ILS/0/SD_ILS:578140 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Shashi Bhushan, 1928- editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003296034">https://www.taylorfrancis.com/books/9781003296034</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Poston, Howard E., III, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 P67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of cryptographic algorithms in blockchain ent://SD_ILS/0/SD_ILS:559745 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Huang, Ke, 1989- author.&#160;Mu, Yi, 1955- author.&#160;Rezaeibagha, Fatemeh, author.&#160;Zhang, Xiaosong, 1968- author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 H83 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003190127">https://www.taylorfrancis.com/books/9781003190127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and optimization ent://SD_ILS/0/SD_ILS:556640 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Tanwar, Rohit, editor.&#160;Choudhury, Tanupriya, editor.&#160;Zamani, Mazdak, editor.&#160;Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secret history the story of cryptology ent://SD_ILS/0/SD_ILS:567958 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Bauer, Craig P., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315162539">https://www.taylorfrancis.com/books/9781315162539</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hybrid Encryption Algorithms over Wireless Communication Channels ent://SD_ILS/0/SD_ILS:568156 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Shaheen, Mai Helmy Ahmed, 1981- author.<br/>Preferred Shelf Number&#160;TK5102.94<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003051428">https://www.taylorfrancis.com/books/9781003051428</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto ent://SD_ILS/0/SD_ILS:595556 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain and the law : the rule of code ent://SD_ILS/0/SD_ILS:509732 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;De Filippi, Primavera, author.&#160;Wright, Aaron (Writer on law), author.<br/>Preferred Shelf Number&#160;XX(509732.1)<br/>Electronic Access&#160;EBSCOhost <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1743737">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1743737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:458788 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Shavers, Brett, author.&#160;Bair, John, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Audio content security : attack analysis on audio watermarking ent://SD_ILS/0/SD_ILS:458990 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Ghorbani, Sogand, author.&#160;Amiri, Iraj Sadegh, 1977- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128113837">http://www.sciencedirect.com/science/book/9780128113837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:540133 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P725 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482228908">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:544162 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Ling, San, 1964, author.&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;QA268 .L545 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computational number theory ent://SD_ILS/0/SD_ILS:364309 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Das, Abhijit, 1968-<br/>Preferred Shelf Number&#160;QA241 D37 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:539468 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;TA1637 .V544 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Noiseless steganography : the key to covert communications ent://SD_ILS/0/SD_ILS:546597 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Desoky, Abdelrahman., author.<br/>Preferred Shelf Number&#160;QA268 .D47 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439846223">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;QA76.9 .A25 P385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning in image steganalysis ent://SD_ILS/0/SD_ILS:249378 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Schaathun, Hans Georg.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing ent://SD_ILS/0/SD_ILS:279514 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Weber, Stefan G.&#160;IOS Press.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:299126 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Yan, Song Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:147530 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Cusick, Thomas W., 1943-&#160;St&#259;nic&#259;, Pantelimon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia content encryption : techniques and applications ent://SD_ILS/0/SD_ILS:539955 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Lian, Shiguo., author.<br/>Preferred Shelf Number&#160;QA76.575 .L52 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420065282">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia encryption and authentication techniques and applications ent://SD_ILS/0/SD_ILS:543195 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;QA76.575 .M83185 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013450">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Authentication codes and combinatorial designs ent://SD_ILS/0/SD_ILS:547049 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Pei, Dingyi., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P42 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:543504 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;TK5102.94 .Q36 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:119741 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Cook, Debra L.&#160;Keromytis, Angelos.<br/>Preferred Shelf Number&#160;QA76.9.D314 C66 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M67 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Elektronik imza ve uygulamas&#305; ent://SD_ILS/0/SD_ILS:131968 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Orta, Mesut.<br/>Preferred Shelf Number&#160;KKX872.5 .O78 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Watermarking systems engineering : enabling digital assets security and other applications ent://SD_ILS/0/SD_ILS:544356 2026-02-21T03:31:00Z 2026-02-21T03:31:00Z Author&#160;Barni, Mauro., author.&#160;Bartolini, Franco, 1965-2004.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B3792 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135538460">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>