1. Engineering secure two-party computation protocols
Author: Thomas Schneider
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
TK5105
.
55
.
S36
2012eb


2. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


3. Rethinking public key infrastructures and digital certificates :
Author: / Stefan A. Brands
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
TK5105
.
59
.
B73
2000


4. Rethinking public key infrastructures and digital certificates
Author: / Stefan A. Brands
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
E-BOOK
