Search Results for Data Encryption. - Narrowed by: Computational intelligence.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Computational$002bintelligence.$002509Computational$002bintelligence.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-01T16:04:33ZAdvances in Network Systems Architectures, Security, and Applicationsent://SD_ILS/0/SD_ILS:4805352026-04-01T16:04:33Z2026-04-01T16:04:33Zby Grzenda, Maciej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44354-6">http://dx.doi.org/10.1007/978-3-319-44354-6</a><br/>Format: Electronic Resources<br/>Intelligent Techniques in Signal Processing for Multimedia Securityent://SD_ILS/0/SD_ILS:4805532026-04-01T16:04:33Z2026-04-01T16:04:33Zby Dey, Nilanjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44790-2">http://dx.doi.org/10.1007/978-3-319-44790-2</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-04-01T16:04:33Z2026-04-01T16:04:33Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-04-01T16:04:33Z2026-04-01T16:04:33Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016ent://SD_ILS/0/SD_ILS:4816462026-04-01T16:04:33Z2026-04-01T16:04:33Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format: Electronic Resources<br/>