• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۵ پاسخ غیر تکراری از ۱۶۸ پاسخ تکراری در مدت زمان ۰,۷۸ ثانیه یافت شد.

121. New trends in computer technologies and applications :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chuan-Yu Chang, Chien-Chou Lin, Horng-Horng Lin (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Electronic data processing, Congresses.,Self-organizing systems, Congresses.,Electronic data processing.,Self-organizing systems.

Classification :
QA75
.
5
.
I58
2018

122. Non-commutative cryptography and complexity of group-theoretic problems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Myasnikov, Alexei G., 5591-

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Combinatorial group theory,، Cryptography,، Computer algorithms,، Number theory

Classification :
QA
182
.
5
.
M93N6

123. Non-commutative cryptography and complexity of group-theoretic problems /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov ; with an appendix by Natalia Mosina

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Combinatorial group theory,Computer algorithms,Cryptography,Number theory

Classification :
QA182
.
5
.
M934
2011

124. Number Theory in Science and Communication :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Manfred R. Schroeder.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory.,Mathematics.,Number theory.

Classification :

125. Number-theoretic methods in cryptology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.

Classification :
QA76
.
9
.
A25
N88
2017

126. Number theory for computing

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Song Y. Yan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science -- Mathematics.,Getaltheorie.,Number theory.

Classification :
QA241
.
S664
2000

127. Optimizing Smith-Waterman Algorithm Using Residue Number System and Recursive Variable Expansion

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bello, Hassan Kehinde

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Bioinformatics,Biostatistics,Computer science

Classification :

128. Optimizing Smith-Waterman Algorithm Using Residue Number System and Recursive Variable Expansion

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bello, Hassan Kehinde

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Bioinformatics,Biostatistics,Computer science

Classification :

129. Post-quantum cryptography :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Tanja Lange, Rainer Steinwandt.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.

Classification :
QA76
.
9
.
A25

130. ++Practical Cryptography: Algorithms and Implementations Using C

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Azad, Saiful

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING

Classification :
E-BOOK

131. Practical cryptography :algorithms and implementations using C++

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Saiful Azad, Al-Sakib Khan Pathan

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography

Classification :
QA
76
.
9
.
A25
P725

132. Practical cryptography in Python :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Seth James Nielson, Christopher K. Monson.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)

Classification :
QA76
.
9
.
A25

133. Practical embedded security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Timothy Stapko.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Embedded computer systems.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Embedded computer systems.

Classification :
TK7895
.
E42
S735
2008eb

134. Practical quantum computing for developers :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Silva Vladimir.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Quantum computing.,Big Data.,Mathematical Models of Cognitive Processes and Neural Networks.,Programming Languages, Compilers, Interpreters.,Python.,Quantum Computing.,Quantum computing.

Classification :
QA76
.
889
.
S55
2018

135. Proceedings of International Ethical Hacking Conference 2018 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

136. Proceedings of the Third International Conference on Soft Computing for Problem Solving :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bansal.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Applied mathematics.,Artificial intelligence.,Engineering.

Classification :
QA76
.
9
.
S63
E358
2014

137. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Anand J. Kulkarni, Suresh Chandra Satapathy, Tai Kang, Ali Husseinzadeh Kashan, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Congresses.,Information technology, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.

Classification :
T58
.
5

138. Progress in cryptology--AFRICACRYPT 2009 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bart Preneel (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie

Classification :
QA76
.
9
.
A25
I58
2009

139. Provable security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.

Classification :
QA76
.
9
.
A25

140. Quantum Cryptography-Post

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer science. ; Computer communication systems. ; Computer security. ; Data encryption (Computer science). ; Algorithms. ; Computer science ; Mathematics. ; Management information systems. ; Computer Science. ; Data Encryption. ; Computer Communicatio

Classification :
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival