Search Results for Microelectronics - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMicroelectronics$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-03-26T11:34:57Z
5G Enabled Secure Wireless Networks
ent://SD_ILS/0/SD_ILS:483926
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Jayakody, Dushantha Nalin K. editor. Srinivasan, Kathiravan. editor. Sharma, Vishal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03508-2">https://doi.org/10.1007/978-3-030-03508-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part I
ent://SD_ILS/0/SD_ILS:611848
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Mandal, J. K. editor. (orcid)0000-0001-9447-647X Dutta, Paramartha. editor. Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware IP Security and Trust
ent://SD_ILS/0/SD_ILS:614176
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Mishra, Prabhat. editor. Bhunia, Swarup. editor. Tehranipoor, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II
ent://SD_ILS/0/SD_ILS:611150
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Mandal, J. K. editor. (orcid)0000-0001-9447-647X Dutta, Paramartha. editor. Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Group-target Tracking
ent://SD_ILS/0/SD_ILS:618179
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Geng, Wen-dong. author. Wang, Yuan-qin. author. Dong, Zheng-hong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure System Design and Trustable Computing
ent://SD_ILS/0/SD_ILS:614266
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Chang, Chip-Hong. editor. Potkonjak, Miodrag. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Deletion
ent://SD_ILS/0/SD_ILS:617190
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Reardon, Joel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing for Embedded Systems
ent://SD_ILS/0/SD_ILS:530149
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Candaele, Bernard. editor. Soudris, Dimitrios. editor. Anagnostopoulos, Iraklis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits
ent://SD_ILS/0/SD_ILS:332116
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Peeters, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332116.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Unclonable Functions in Theory and Practice
ent://SD_ILS/0/SD_ILS:331657
2026-03-26T11:34:57Z
2026-03-26T11:34:57Z
Author Böhm, Christoph. author. Hofer, Maximilian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331657.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>