Search Results for Data encryption (Computer science) - Narrowed by: 2009 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-23T19:38:26Z Identity-based cryptography ent://SD_ILS/0/SD_ILS:953080 2026-03-23T19:38:26Z 2026-03-23T19:38:26Z by&#160;Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Modelling cyber security approaches, methodology, strategies ent://SD_ILS/0/SD_ILS:962577 2026-03-23T19:38:26Z 2026-03-23T19:38:26Z by&#160;NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1193238 2026-03-23T19:38:26Z 2026-03-23T19:38:26Z by&#160;Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-03-23T19:38:26Z 2026-03-23T19:38:26Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>