Search Results for Computer security. - Narrowed by: Data Encryption.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?dt=list2026-03-30T05:22:44ZDigital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-03-30T05:22:44Z2026-03-30T05:22:44Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-03-30T05:22:44Z2026-03-30T05:22:44Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-03-30T05:22:44Z2026-03-30T05:22:44Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>