Search Results for Data encryption (Computer science) - Narrowed by: 2017SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-24T11:16:21ZCryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-03-24T11:16:21Z2026-03-24T11:16:21Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Electronic Resources<br/>Color image watermarking : algorithms and technologiesent://SD_ILS/0/SD_ILS:11225632026-03-24T11:16:21Z2026-03-24T11:16:21Zby Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-03-24T11:16:21Z2026-03-24T11:16:21Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-03-24T11:16:21Z2026-03-24T11:16:21Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-03-24T11:16:21Z2026-03-24T11:16:21Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-03-24T11:16:21Z2026-03-24T11:16:21Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Secure and Privacy-Preserving Data Communication in Internet of Thingsent://SD_ILS/0/SD_ILS:4817152026-03-24T11:16:21Z2026-03-24T11:16:21Zby Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Electronic Resources<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:4808282026-03-24T11:16:21Z2026-03-24T11:16:21Zby Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-03-24T11:16:21Z2026-03-24T11:16:21Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>