Arama Sonu&ccedil;lar&#305; Data encryption (Computer science). - Daralt&#305;lm&#305;&#351;: Computational intelligence. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Konu$002509Computational$002bintelligence.$002509Computational$002bintelligence.$0026ps$003d300?dt=list 2025-12-05T14:01:16Z Crypto and AI From Coevolution to Quantum Revolution ent://SD_ILS/0/SD_ILS:528761 2025-12-05T14:01:16Z 2025-12-05T14:01:16Z Yazar&#160;Zolfaghari, Behrouz. author.&#160;Nemati, Hamid. author.&#160;Yanai, Naoto. author.&#160;Bibak, Khodakhast. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A Nature-Inspired Approach to Cryptology ent://SD_ILS/0/SD_ILS:528952 2025-12-05T14:01:16Z 2025-12-05T14:01:16Z Yazar&#160;Shandilya, Shishir Kumar. author.&#160;Datta, Agni. author.&#160;Nagar, Atulya K. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Steganography Techniques for Digital Images ent://SD_ILS/0/SD_ILS:487340 2025-12-05T14:01:16Z 2025-12-05T14:01:16Z Yazar&#160;Yahya, Abid. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>