Search Results for Science. - Narrowed by: E-Book - Online Library - 2009 - Data encryption (Computer science). - Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dScience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T00:06:53Z Smart Spaces and Next Generation Wired/Wireless Networking 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190865 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Balandin, Sergey. editor.&#160;Moltchanov, Dmitri. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04190-7">http://dx.doi.org/10.1007/978-3-642-04190-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digitale Fernseh- und H&ouml;rfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-&Uuml;bertragungstechnik, Messtechnik ent://SD_ILS/0/SD_ILS:189006 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Fischer, Walter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88195-7">http://dx.doi.org/10.1007/978-3-540-88195-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless and Mobile Networking Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gda&#324;sk, Poland, September 9-11, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190757 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Wozniak, Jozef. editor.&#160;Konorski, Jerzy. editor.&#160;Katulski, Ryszard. editor.&#160;Pach, Andrzej R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03841-9">http://dx.doi.org/10.1007/978-3-642-03841-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Engineering ent://SD_ILS/0/SD_ILS:166887 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71817-0">http://dx.doi.org/10.1007/978-0-387-71817-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID Security Techniques, Protocols and System-on-Chip Design ent://SD_ILS/0/SD_ILS:167344 2024-09-10T00:06:53Z 2024-09-10T00:06:53Z Author&#160;Kitsos, Paris. editor.&#160;Zhang, Yan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>