Search Results for Manipulation - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dManipulation$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2026-04-26T12:13:11Z Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:615622 2026-04-26T12:13:11Z 2026-04-26T12:13:11Z Author&#160;Nematollahi, Mohammad Ali. author.&#160;Vorakulpipat, Chalee. author.&#160;Rosales, Hamurabi Gamboa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612125 2026-04-26T12:13:11Z 2026-04-26T12:13:11Z Author&#160;Duquesne, Sylvain. editor.&#160;Petkova-Nikova, Svetla. editor. (orcid)0000-0003-3133-9261&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:330828 2026-04-26T12:13:11Z 2026-04-26T12:13:11Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330828.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>