Search Results for Data encryption (Computer science) - Narrowed by: 2012SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?dt=list2026-03-27T09:32:03ZCryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-03-27T09:32:03Z2026-03-27T09:32:03Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Electronic Resources<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-03-27T09:32:03Z2026-03-27T09:32:03Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Electronic Resources<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:10010092026-03-27T09:32:03Z2026-03-27T09:32:03Zby Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format: Electronic Resources<br/>Burdens of proof cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:10820422026-03-27T09:32:03Z2026-03-27T09:32:03Zby Blanchette, Jean-François.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format: Electronic Resources<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412026-03-27T09:32:03Z2026-03-27T09:32:03Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Electronic Resources<br/>