Search Results for Features. - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFeatures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list
2026-03-14T21:00:44Z
Quantum Computing and Quantum Machine Learning for Engineers and Developers
ent://SD_ILS/0/SD_ILS:610159
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Van Griensven Thé, Jesse. author. Fraser, Roydon Andrew. author. Rosas-Bustos, Jose. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-98245-3">https://doi.org/10.1007/978-3-031-98245-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault-Tolerant Distributed Consensus in Synchronous Networks
ent://SD_ILS/0/SD_ILS:607763
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Choudhury, Ashish. author. Patra, Arpita. author. (orcid)0000-0002-8036-4407 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-80460-1">https://doi.org/10.1007/978-3-031-80460-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners
ent://SD_ILS/0/SD_ILS:608948
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Guo, Fuchun. author. (orcid)0000-0001-6939-7710 Susilo, Willy. author. (orcid)0000-0002-1562-5105 Nguyen, Khoa. author. Chen, Xiaofeng. author. Zhao, Zhen. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Execution Environments
ent://SD_ILS/0/SD_ILS:604058
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Shepherd, Carlton. author. Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
ent://SD_ILS/0/SD_ILS:603566
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Paar, Christof. author. Pelzl, Jan. author. Güneysu, Tim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023
ent://SD_ILS/0/SD_ILS:603303
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Chaturvedi, Atul. editor. Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221 Roy, Bimal Kumar. editor. Tsaban, Boaz. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022
ent://SD_ILS/0/SD_ILS:601864
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Roy, Bimal Kumar. editor. Chaturvedi, Atul. editor. Tsaban, Boaz. editor. Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cybersecurity A Multidisciplinary Challenge
ent://SD_ILS/0/SD_ILS:601841
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Sharp, Robin. author. (orcid)0000-0002-8593-267X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Animal Biometrics Techniques and Applications
ent://SD_ILS/0/SD_ILS:612758
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Kumar, Santosh. author. Singh, Sanjay Kumar. author. Singh, Rishav. author. Singh, Amit Kumar. author. (orcid)0000-0001-7359-2068 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical and Social Issues in the Information Age
ent://SD_ILS/0/SD_ILS:611657
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids
ent://SD_ILS/0/SD_ILS:618045
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Borges de Oliveira, Fábio. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:616293
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Phan, Raphaël C.-W. editor. Yung, Moti. editor. (orcid)0000-0003-0848-0873 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Deception Building the Scientific Foundation
ent://SD_ILS/0/SD_ILS:611890
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cyberdeception
ent://SD_ILS/0/SD_ILS:614814
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Rowe, Neil C. author. Rrushi, Julian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethics in Computing A Concise Module
ent://SD_ILS/0/SD_ILS:617386
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
ent://SD_ILS/0/SD_ILS:618584
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Ruan, Xiaoyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Hadoop Security
ent://SD_ILS/0/SD_ILS:618551
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Lakhe, Bhushan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting Oracle Database 12c
ent://SD_ILS/0/SD_ILS:618628
2026-03-14T21:00:44Z
2026-03-14T21:00:44Z
Author Wright, Paul. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6212-1">https://doi.org/10.1007/978-1-4302-6212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>