• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۴ پاسخ غیر تکراری از ۴ پاسخ تکراری در مدت زمان ۰,۳۷ ثانیه یافت شد.

1. Engineering secure two-party computation protocols

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Thomas Schneider

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)

Classification :
TK5105
.
55
.
S36
2012eb

2. Protocols for authentication and key establishment

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Colin Boyd, Anish Mathuria.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)

Classification :
TK5105
.
59
B936
2011

3. Rethinking public key infrastructures and digital certificates :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Stefan A. Brands

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)

Classification :
TK5105
.
59
.
B73
2000

4. Rethinking public key infrastructures and digital certificates

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Stefan A. Brands

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)

Classification :
E-BOOK
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival