Search Results for Microelectronics - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMicroelectronics$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-26T11:34:57Z 5G Enabled Secure Wireless Networks ent://SD_ILS/0/SD_ILS:483926 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Jayakody, Dushantha Nalin K. editor.&#160;Srinivasan, Kathiravan. editor.&#160;Sharma, Vishal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03508-2">https://doi.org/10.1007/978-3-030-03508-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:611848 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Mandal, J. K. editor. (orcid)0000-0001-9447-647X&#160;Dutta, Paramartha. editor.&#160;Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:614176 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Mishra, Prabhat. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:611150 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Mandal, J. K. editor. (orcid)0000-0001-9447-647X&#160;Dutta, Paramartha. editor.&#160;Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:618179 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Geng, Wen-dong. author.&#160;Wang, Yuan-qin. author.&#160;Dong, Zheng-hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure System Design and Trustable Computing ent://SD_ILS/0/SD_ILS:614266 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Chang, Chip-Hong. editor.&#160;Potkonjak, Miodrag. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:617190 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Reardon, Joel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2026-03-26T11:34:57Z 2026-03-26T11:34:57Z Author&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331657.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>