Search Results for Discussion. - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDiscussion.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list
2026-03-25T06:34:06Z
Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:605581
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Chen, Xiaofeng. editor. Huang, Xinyi. editor. Yung, Moti. editor. (orcid)0000-0003-0848-0873 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:605582
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Chen, Xiaofeng. editor. Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
ent://SD_ILS/0/SD_ILS:603566
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Paar, Christof. author. Pelzl, Jan. author. Güneysu, Tim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical and Social Issues in the Information Age
ent://SD_ILS/0/SD_ILS:611657
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware Protection through Obfuscation
ent://SD_ILS/0/SD_ILS:613957
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Forte, Domenic. editor. Bhunia, Swarup. editor. Tehranipoor, Mark M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet
ent://SD_ILS/0/SD_ILS:618007
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author El Hajji, Said. editor. Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cyberdeception
ent://SD_ILS/0/SD_ILS:614814
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Rowe, Neil C. author. Rrushi, Julian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings
ent://SD_ILS/0/SD_ILS:616105
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Pointcheval, David. editor. Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Rachidi, Tajjeeddine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethics in Computing A Concise Module
ent://SD_ILS/0/SD_ILS:617386
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Cloud Computing Security A Survey of Key Practicalities
ent://SD_ILS/0/SD_ILS:617823
2026-03-25T06:34:06Z
2026-03-25T06:34:06Z
Author Alani, Mohammed M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>