• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۵ پاسخ غیر تکراری از ۱۶۸ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

21. Algorithms and data structures :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Douglas Baldwin and Greg W. Scragg.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer algorithms.,Data structures (Computer science),Algorithmes.,Structures de données (Informatique),Algorithmus,Algorithmus.,Computer algorithms.,Data structures (Computer science),Datenstruktur,Datenstruktur.

Classification :
QA76
.
9
.
A43
B35
2004

22. Applications of Finite Fields

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Ian F. Blake, XuHong Gao, Ronald C. Mullin, Scott A. Vanstone, Tomik Yaghoobian ; edited by Alfred J. Menezes.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory.,Computational complexity.,Computer engineering.,Engineering.

Classification :

23. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Gérard Cohen, Marc Giusti, Teo Mora.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory.,Computer science.,Data encryption (Computer science)

Classification :

24. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jaime G Carbonell

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject:

Classification :

25. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Telecommunication--Security measures,Cryptography.,Cryptology

Classification :
QA
,
76
.
9
,.
A25
,
S35
,
1996

26. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security,Telecommunication--Security measure,Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

27. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Telecommunication- Security measures,Cryptography

Classification :
QA76
.
9
.
A25
,
S35
1994

28. Applied cryptography : protocols, algorithms, and source code in C

پدیدآورنده : Schneier, Bruce

موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography

۲ نسخه از این کتاب در ۱ کتابخانه موجود است.

29. Applied cryptography : protocols, algorithms, and source code in C

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security, Telecommunication - Security measures, Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

30. Applied cryptography: protocols, algorithms, and source code in C

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Security measures ، Telecommunication,، Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

31. Applied cryptography: protocols, algorithms, and source code in C [electronic resource]

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer security,Telecommunication--Security measures,Cryptography

Classification :
EB
,
QA76
.
9
.
A25
,
S35
1996

32. Applied cryptography :protocols, algorithms, and source code in C ruce Schneier

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library and Documentation Center (Semnan)

Subject: ، Computer security,، Telecommunicatio--Security measures,، Cryptography

Classification :
QA
76
.
9
.
A25S35
1996

33. Artificial intelligence, evolutionary computing and metaheuristics :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Xin-She Yang (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence.,Computer algorithms.,Evolutionary computation.

Classification :
Q335
.
X567
9999

34. Automata, languages and programming :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: J. Leach Albert, B. Monien, M. Rodríguez Artalejo (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Machine theory -- Congresses.,Machine theory.

Classification :
QA267
.
J543
1991

35. Automata, languages, and programming :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by J.W. de Bakker and J. van Leeuwen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer programming -- Congresses.,Formal languages -- Congresses.,Machine theory -- Congresses.

Classification :

36. Boolean functions in cryptology and information security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / edited by Bart Preneel and Oleg A. Logachev

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses

Classification :
E-BOOK

37. Boolean models and methods in mathematics, computer science, and engineering /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Yves Crama, Peter L. Hammer

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Algebra, Boolean,Probabilities

Classification :
QA10
.
3
.
B658
2010

38. Chaos-based cryptography :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ljupco Kocarev and Shiguo Lian (Eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Cryptography,Artificial Intelligence (incl. Robotics),Computational Intelligence,Data Encryption,Data Structures, Cryptology and Information Theory

Classification :
QA76
.
9
.
A25
C427
2011eb

39. Chaos-based cryptography :theory, algorithms and applications

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: ]edited by[ Ljupco Kocarev, Shiguo Lian

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25
C427

40. Chaos-based cryptography: theory, algorithms and applications

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: ]edited by[ Ljupco Kocarev and Shiguo Lian

Library: Central Library and Documentation Center (Kerman)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25
C4
2011
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival