• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۵۹ پاسخ غیر تکراری از ۵۹ پاسخ تکراری در مدت زمان ۰,۶۴ ثانیه یافت شد.

1. Advances in Cryptology -- EUROCRYPT 2019 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Yuval Ishai, Vincent Rijmen (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25

2. Advances in Cryptology – EUROCRYPT 2015

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ edited by Elisabeth Oswald, Marc Fischlin.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,کامپیوترها -- ایمنی اطلاعات -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
QA76
.
9
.
A38
2015
E-Book
,

3. Advances in cryptology -- EUROCRYPT 2018 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.

Classification :
QA76
.
9
.
A25

4. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری داده‌ها -- کنگره‌ها,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
E-Book
,

5. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Jianying Zhou, MotiYung (Eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
E-Book
,

6. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
E-Book
,

7. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ [Edited by] Michael Jacobson...[et.al]

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
E-Book
,

8. Applied Cryptography and Network Security.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ [edited by] Tal Malkin...[et.al]

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Cloud computing -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها ,محاسبات ابری -- کنگره ها

Classification :
QA
76
.
9
.
A66
2015
E-Book
,

9. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره ها

Classification :
E-Book
,

10. Applied cryptography and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Javier Lopez, Gene Tsudik (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Réseaux d'ordinateurs -- Sécurité -- Mesures.

Classification :

11. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Michael Jacobson ... [et al.]. (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cloud computing, Congresses,Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
A26
2013

12. Applied cryptography and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung, (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)

Classification :
TK5102
.
94
.
A28
2019

13. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
A26
2012eb

14. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jianying Zhou, Moti Yung (eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses

Classification :
QA76
.
9
.
A25A26
2010

15. Computer security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.

Classification :
QA76
.
9
.
A25

16. Computer security - ESORICS 2012

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
E98
2012eb

17. Critical information infrastructure security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
C75
2011

18. Critical information infrastructures security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
C75
2018eb

19. Critical information infrastructures security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Christos Xenakis, Stephen Wolthusen (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
C75
2010

20. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jan Camenisch, Panos Papadimitratos (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.

Classification :
QA76
.
9
.
A25
  • »
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival