Search Results for Data encryption (Computer science) - Narrowed by: Data Encryption. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-24T03:49:08Z Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-03-24T03:49:08Z 2026-03-24T03:49:08Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-03-24T03:49:08Z 2026-03-24T03:49:08Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:481715 2026-03-24T03:49:08Z 2026-03-24T03:49:08Z by&#160;Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:480828 2026-03-24T03:49:08Z 2026-03-24T03:49:08Z by&#160;Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-03-24T03:49:08Z 2026-03-24T03:49:08Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>