121. New trends in computer technologies and applications :
Author: Chuan-Yu Chang, Chien-Chou Lin, Horng-Horng Lin (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic data processing, Congresses.,Self-organizing systems, Congresses.,Electronic data processing.,Self-organizing systems.
Classification :
QA75
.
5
.
I58
2018


122. Non-commutative cryptography and complexity of group-theoretic problems
Author: Myasnikov, Alexei G., 5591-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Combinatorial group theory,، Cryptography,، Computer algorithms,، Number theory
Classification :
QA
182
.
5
.
M93N6


123. Non-commutative cryptography and complexity of group-theoretic problems /
Author: Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov ; with an appendix by Natalia Mosina
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Combinatorial group theory,Computer algorithms,Cryptography,Number theory
Classification :
QA182
.
5
.
M934
2011


124. Number Theory in Science and Communication :
Author: by Manfred R. Schroeder.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Mathematics.,Number theory.

125. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


126. Number theory for computing
Author: Song Y. Yan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Mathematics.,Getaltheorie.,Number theory.
Classification :
QA241
.
S664
2000


127. Optimizing Smith-Waterman Algorithm Using Residue Number System and Recursive Variable Expansion
Author: Bello, Hassan Kehinde
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Bioinformatics,Biostatistics,Computer science

128. Optimizing Smith-Waterman Algorithm Using Residue Number System and Recursive Variable Expansion
Author: Bello, Hassan Kehinde
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Bioinformatics,Biostatistics,Computer science

129. Post-quantum cryptography :
Author: edited by Tanja Lange, Rainer Steinwandt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.
Classification :
QA76
.
9
.
A25


130. ++Practical Cryptography: Algorithms and Implementations Using C
Author: / Azad, Saiful
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING
Classification :
E-BOOK

131. Practical cryptography :algorithms and implementations using C++
Author: edited by Saiful Azad, Al-Sakib Khan Pathan
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography
Classification :
QA
76
.
9
.
A25
P725


132. Practical cryptography in Python :
Author: Seth James Nielson, Christopher K. Monson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)
Classification :
QA76
.
9
.
A25


133. Practical embedded security :
Author: by Timothy Stapko.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Embedded computer systems.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Embedded computer systems.
Classification :
TK7895
.
E42
S735
2008eb


134. Practical quantum computing for developers :
Author: Silva Vladimir.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Quantum computing.,Big Data.,Mathematical Models of Cognitive Processes and Neural Networks.,Programming Languages, Compilers, Interpreters.,Python.,Quantum Computing.,Quantum computing.
Classification :
QA76
.
889
.
S55
2018


135. Proceedings of International Ethical Hacking Conference 2018 :
Author: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


136. Proceedings of the Third International Conference on Soft Computing for Problem Solving :
Author: edited by Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bansal.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Applied mathematics.,Artificial intelligence.,Engineering.
Classification :
QA76
.
9
.
S63
E358
2014


137. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology :
Author: Anand J. Kulkarni, Suresh Chandra Satapathy, Tai Kang, Ali Husseinzadeh Kashan, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Information technology, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.
Classification :
T58
.
5


138. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009


139. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


140. Quantum Cryptography-Post
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer science. ; Computer communication systems. ; Computer security. ; Data encryption (Computer science). ; Algorithms. ; Computer science ; Mathematics. ; Management information systems. ; Computer Science. ; Data Encryption. ; Computer Communicatio
