Search Results for Data Encryption. - Narrowed by: 2017 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-10T16:07:18Z Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1124950 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Color image watermarking : algorithms and technologies ent://SD_ILS/0/SD_ILS:1122563 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:1140799 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:481715 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:480828 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Systems Architectures, Security, and Applications ent://SD_ILS/0/SD_ILS:480535 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Grzenda, Maciej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44354-6">http://dx.doi.org/10.1007/978-3-319-44354-6</a><br/>Format:&#160;Electronic Resources<br/> Data Deduplication for Data Optimization for Storage and Network Systems ent://SD_ILS/0/SD_ILS:480375 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Kim, Daehee. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42280-0">http://dx.doi.org/10.1007/978-3-319-42280-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Techniques in Signal Processing for Multimedia Security ent://SD_ILS/0/SD_ILS:480553 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Dey, Nilanjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44790-2">http://dx.doi.org/10.1007/978-3-319-44790-2</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/> Network processor design : issues and practices ent://SD_ILS/0/SD_ILS:1188477 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Crowley, Patrick, 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608757">http://www.sciencedirect.com/science/book/9781558608757</a><br/>Format:&#160;Electronic Resources<br/> Embedded Sensor Systems ent://SD_ILS/0/SD_ILS:481698 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Agrawal, Dharma Prakash. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3038-3">http://dx.doi.org/10.1007/978-981-10-3038-3</a><br/>Format:&#160;Electronic Resources<br/> Residue Number System Based Fault Tolerant Scheme for Enhancing Rivest Shamir Adleman Encryption Scheme ent://SD_ILS/0/SD_ILS:694772 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Salifu, Abdul-Mumin, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686</a><br/>Format:&#160;Books<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016 ent://SD_ILS/0/SD_ILS:481646 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Communication and Networks ComNet 2016 ent://SD_ILS/0/SD_ILS:481675 2026-04-10T16:07:18Z 2026-04-10T16:07:18Z by&#160;Modi, Nilesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2750-5">http://dx.doi.org/10.1007/978-981-10-2750-5</a><br/>Format:&#160;Electronic Resources<br/>