Search Results for Manipulation - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dManipulation$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2026-04-26T12:13:11Z
Digital Watermarking Techniques and Trends
ent://SD_ILS/0/SD_ILS:615622
2026-04-26T12:13:11Z
2026-04-26T12:13:11Z
Author Nematollahi, Mohammad Ali. author. Vorakulpipat, Chalee. author. Rosales, Hamurabi Gamboa. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:612125
2026-04-26T12:13:11Z
2026-04-26T12:13:11Z
Author Duquesne, Sylvain. editor. Petkova-Nikova, Svetla. editor. (orcid)0000-0003-3133-9261 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2026-04-26T12:13:11Z
2026-04-26T12:13:11Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>